Static task
static1
Behavioral task
behavioral1
Sample
accabae2447e87dac4903c742f8284d537db16dce530718510e5d6dff9e4ace6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
accabae2447e87dac4903c742f8284d537db16dce530718510e5d6dff9e4ace6.exe
Resource
win10v2004-20221111-en
General
-
Target
accabae2447e87dac4903c742f8284d537db16dce530718510e5d6dff9e4ace6
-
Size
42KB
-
MD5
60aad63f959768792840f7bc56cb5bd6
-
SHA1
eaae67c3508619db0f2d1827f2af1c6c04fa8afc
-
SHA256
accabae2447e87dac4903c742f8284d537db16dce530718510e5d6dff9e4ace6
-
SHA512
2816fe6f1518f6139c2d586c8aa5441a0ac8c6d13440f03bbc3d1440c9b0c1598e951b070e774cda263055790153ee5e0fcff39ce860830a4cc5983ae50f642f
-
SSDEEP
768:xvw5L0/djGq7qbrM1urAYkxDyH2uIDJplbXk6v3JymUMR7V4m7a:GL0/djH7mrMIANYH2PJplbXkHmlV4Ia
Malware Config
Signatures
Files
-
accabae2447e87dac4903c742f8284d537db16dce530718510e5d6dff9e4ace6.exe windows x86
2d04cbc025949e250daca4da1ade191f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAddAccessAllowedObjectAce
NtFsControlFile
ZwCreateFile
RtlSetGroupSecurityDescriptor
NtOpenFile
RtlMoveMemory
RtlInitializeSListHead
RtlCustomCPToUnicodeN
RtlCreateRegistryKey
RtlQuerySecurityObject
ZwMakeTemporaryObject
NtCreateIoCompletion
RtlRemoteCall
RtlCompactHeap
ZwUnloadKey
ZwCreateIoCompletion
RtlSetIoCompletionCallback
LdrGetDllHandle
ZwExtendSection
ZwWaitForMultipleObjects
RtlConvertSharedToExclusive
RtlDestroyHandleTable
ZwQueryPerformanceCounter
RtlFindActivationContextSectionString
RtlLengthSecurityDescriptor
memchr
RtlInitializeRXact
NtCreateThread
RtlUnhandledExceptionFilter2
islower
NtAlertResumeThread
kernel32
SetUserGeoID
GetVolumePathNamesForVolumeNameA
SetEndOfFile
ExpandEnvironmentStringsW
GetProcAddress
OpenSemaphoreA
SetMailslotInfo
FreeLibrary
DelayLoadFailureHook
LocalHandle
AttachConsole
SetLocalPrimaryComputerNameA
ConnectNamedPipe
LocalUnlock
CreatePipe
GetStartupInfoA
GetPriorityClass
SearchPathA
GetConsoleInputWaitHandle
InterlockedDecrement
GetVolumePathNameA
GlobalAlloc
GetLocaleInfoA
GetModuleHandleW
ResumeThread
LCMapStringW
HeapValidate
WaitForDebugEvent
VirtualAlloc
WaitForMultipleObjects
LoadLibraryA
SetConsoleOS2OemFormat
RequestDeviceWakeup
CreateMailslotW
SetLastConsoleEventActive
ScrollConsoleScreenBufferA
TerminateThread
imm32
ImmGetDefaultIMEWnd
ImmIMPGetIMEW
ImmTranslateMessage
ImmGetConversionStatus
ImmRequestMessageW
ImmLoadIME
ImmConfigureIMEW
ImmGetIMCCSize
ImmGetImeInfoEx
ImmInstallIMEW
ImmLockClientImc
ImmGetIMEFileNameW
ImmUnlockIMC
ImmSystemHandler
ImmRegisterWordA
ImmGetCandidateListCountW
ImmPutImeMenuItemsIntoMappedFile
ImmShowSoftKeyboard
ImmSetCompositionStringW
ImmReSizeIMCC
ImmGetGuideLineW
ImmSetConversionStatus
ImmCreateIMCC
ImmUnregisterWordW
ImmGetCandidateListW
msports
SerialPortPropPageProvider
ComDBResizeDatabase
ComDBClaimNextFreePort
ComDBOpen
ComDBGetCurrentPortUsage
PortsClassInstaller
SerialDisplayAdvancedSettings
ParallelPortPropPageProvider
ComDBClose
ComDBReleasePort
ComDBClaimPort
gdi32
CreateScalableFontResourceA
GetWorldTransform
EngGetDriverName
DdEntry56
DdEntry19
AbortPath
PATHOBJ_vEnumStart
CreateFontW
GdiSetPixelFormat
OffsetViewportOrgEx
RemoveFontResourceW
ExtEscape
DdEntry22
EngQueryLocalTime
GdiConvertMetaFilePict
RectInRegion
RemoveFontResourceA
DdEntry0
AddFontResourceW
gdiPlaySpoolStream
DdEntry40
GdiEndDocEMF
DdEntry53
CreateRectRgn
CreateICA
GetStockObject
GdiCreateLocalEnhMetaFile
GdiFixUpHandle
GdiConvertDC
BRUSHOBJ_hGetColorTransform
SetBrushAttributes
DdEntry3
EngMultiByteToUnicodeN
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ