Static task
static1
Behavioral task
behavioral1
Sample
9ae5b2d4de0a6fbbfbb8dc9fc3110a24a652f7cc7ae7e4674044ce91decac8fc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ae5b2d4de0a6fbbfbb8dc9fc3110a24a652f7cc7ae7e4674044ce91decac8fc.exe
Resource
win10v2004-20220812-en
General
-
Target
9ae5b2d4de0a6fbbfbb8dc9fc3110a24a652f7cc7ae7e4674044ce91decac8fc
-
Size
173KB
-
MD5
80b7bdacf90c9a8edd2c40a400c4a9bb
-
SHA1
98af4da34da1da84ce57a8ce6c33d184372e00f8
-
SHA256
9ae5b2d4de0a6fbbfbb8dc9fc3110a24a652f7cc7ae7e4674044ce91decac8fc
-
SHA512
90639a1ea29fe2279c49a7fb554f136ba0fdb429240f8e21fea60214de88e6bf9da399f1dc8b7b715f912422ec7f85c9e0c2fab13f9f298046949e07f45fff0a
-
SSDEEP
3072:sXJmdxo8npEPz8cF7bnYxP9BBYz3bOEm7QvEWkXliwNo9V2:gmY8npMz8cVYN6bu7QeY
Malware Config
Signatures
Files
-
9ae5b2d4de0a6fbbfbb8dc9fc3110a24a652f7cc7ae7e4674044ce91decac8fc.exe windows x86
9c45358f7cb440cc99355593a78ba684
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
GetProcessWindowStation
LoadStringW
GetAppCompatFlags2
wsprintfA
RegisterClipboardFormatA
CharUpperA
CharLowerBuffW
wvsprintfA
TranslateMessage
GetDC
GetCapture
TranslateMessage
GetLastInputInfo
TranslateAcceleratorW
ClientThreadSetup
GetWindowLongA
ClientThreadSetup
GetWindowLongA
GetWindowLongW
SystemParametersInfoW
GetDCEx
FindWindowA
MsgWaitForMultipleObjectsEx
DispatchMessageW
CharLowerBuffW
SetTimer
GetThreadDesktop
CharUpperA
TranslateMessage
SystemParametersInfoW
kernel32
WaitForSingleObjectEx
LoadLibraryExA
CreateProcessW
LoadLibraryExW
VirtualProtect
SleepEx
CreateProcessA
VirtualProtectEx
ReleaseMutex
WriteProcessMemory
ReadProcessMemory
ReadFile
GetStartupInfoA
LoadLibraryA
TerminateProcess
GetStartupInfoW
ReadProcessMemory
SleepEx
GetStartupInfoW
GetSystemTimeAsFileTime
CreateProcessW
GetSystemTimeAsFileTime
GetStartupInfoW
LoadLibraryExW
ReadFile
GetStartupInfoA
VirtualProtectEx
GetSystemTime
VirtualProtect
ReadProcessMemory
Sleep
GetProcAddress
Sleep
GetLastError
LoadLibraryA
GetCommandLineA
SetHandleInformation
lstrcmpiA
TlsGetValue
FindAtomA
GetCurrentDirectoryA
GetCurrentThread
GetCurrentThreadId
TerminateProcess
DeviceIoControl
VirtualProtect
CreateProcessW
WriteProcessMemory
VirtualProtect
VirtualProtect
GetStartupInfoW
ReadProcessMemory
WaitForSingleObjectEx
SleepEx
GetStartupInfoW
LoadLibraryExW
LoadLibraryExA
ReadFile
ReadProcessMemory
CreateProcessA
GetSystemTimeAsFileTime
TerminateProcess
Sleep
ReleaseMutex
TerminateProcess
ReadProcessMemory
GetSystemTimeAsFileTime
CreateProcessA
TerminateProcess
VirtualProtect
CreateProcessA
ReadProcessMemory
GetStartupInfoA
WaitForSingleObject
TerminateProcess
GetSystemTime
SleepEx
SleepEx
ReadProcessMemory
WaitForSingleObjectEx
WaitForSingleObjectEx
GetSystemTime
GetSystemTimeAsFileTime
TerminateProcess
LoadLibraryExA
LoadLibraryExA
GetSystemTime
ReleaseMutex
WriteProcessMemory
GetSystemTime
ReadProcessMemory
CreateProcessW
Sleep
GetStartupInfoW
ReadFile
LoadLibraryExW
VirtualProtect
ReadFile
ReleaseMutex
GetStartupInfoA
GetStartupInfoW
ReadFile
CreateProcessA
GetSystemTimeAsFileTime
ReadFile
CreateFileA
WaitForSingleObject
LoadLibraryA
WriteProcessMemory
CreateProcessW
VirtualProtect
LoadLibraryA
ReadProcessMemory
WaitForSingleObjectEx
ReadProcessMemory
CreateProcessW
ReadProcessMemory
WaitForSingleObjectEx
GetSystemTimeAsFileTime
GetStartupInfoW
ReleaseMutex
Sleep
CreateFileA
LoadLibraryA
WriteProcessMemory
CreateFileA
GetStartupInfoA
CreateProcessA
CreateFileA
ReleaseMutex
GetStartupInfoW
WriteProcessMemory
Sleep
WaitForSingleObject
GetSystemTime
CreateFileA
ReleaseMutex
DeviceIoControl
VirtualProtect
VirtualProtect
VirtualProtectEx
VirtualProtect
WriteProcessMemory
SleepEx
LoadLibraryExW
WaitForSingleObjectEx
ReleaseMutex
SleepEx
WriteProcessMemory
GetSystemTimeAsFileTime
WaitForSingleObject
VirtualProtectEx
Sleep
GetStartupInfoA
VirtualProtect
ReleaseMutex
LoadLibraryExW
GetSystemTimeAsFileTime
VirtualProtect
GetSystemTime
WaitForSingleObject
CreateFileA
LoadLibraryA
TerminateProcess
LoadLibraryExA
VirtualProtectEx
DeviceIoControl
CreateProcessW
WaitForSingleObjectEx
CreateProcessW
SleepEx
LoadLibraryExA
ReadFile
GetSystemTimeAsFileTime
advapi32
RevertToSelf
GetSecurityDescriptorDacl
RegCloseKey
RegCloseKey
GetTokenInformation
AccessCheck
RegOpenKeyExW
RegCloseKey
OpenThreadToken
OpenThreadToken
RevertToSelf
RegCloseKey
RegOpenKeyExW
RegCloseKey
ImpersonateNamedPipeClient
OpenThreadToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetTokenInformation
gdi32
GetTextMetricsW
GetObjectW
CreateRectRgnIndirect
GetHFONT
GdiGetCodePage
GetWindowExtEx
GetObjectType
SetBkMode
GetCurrentObject
DeleteDC
SetBkMode
CreateSolidBrush
SetBkMode
ExtTextOutW
SetViewportOrgEx
GetWindowExtEx
RectVisible
GetClipBox
GetViewportOrgEx
SetBkColor
comdlg32
GetFileTitleW
GetFileTitleA
GetFileTitleW
GetFileTitleA
GetFileTitleW
GetFileTitleA
GetFileTitleW
GetFileTitleW
GetFileTitleW
GetFileTitleA
GetFileTitleW
GetFileTitleW
GetFileTitleW
GetFileTitleW
GetFileTitleA
GetFileTitleA
GetFileTitleA
GetFileTitleW
GetFileTitleA
GetFileTitleW
Sections
.text Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 143KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_MEM_READ
qwerty Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ