Static task
static1
Behavioral task
behavioral1
Sample
acd8a6e71fd565e9dfe87295954ed0660c9d48a8c0556acd35269d1f9529fb0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acd8a6e71fd565e9dfe87295954ed0660c9d48a8c0556acd35269d1f9529fb0a.exe
Resource
win10v2004-20220812-en
General
-
Target
acd8a6e71fd565e9dfe87295954ed0660c9d48a8c0556acd35269d1f9529fb0a
-
Size
1017KB
-
MD5
1cd6b1bdc62b74a8aebc798d46f79440
-
SHA1
42a70046f855afb905f1404ddc9d6f7d21555dae
-
SHA256
acd8a6e71fd565e9dfe87295954ed0660c9d48a8c0556acd35269d1f9529fb0a
-
SHA512
a49821b8fb3e65bf8583a0bf0543103bfe54c3ab1c6a17edbdeea854a2f9089c8db5b4e53a36ca1b56186e232dbd7c0790dfb4ae27ca903f28ffa7796cd191b7
-
SSDEEP
12288:3yz718GzhErlX9U+OeO+OeNhBBhhBBeY5bfmThQDYctNDvTBO27SEwt8mA+SmW2T:izp8GzQXCOfmWtNDvTBO2st7vSo/
Malware Config
Signatures
Files
-
acd8a6e71fd565e9dfe87295954ed0660c9d48a8c0556acd35269d1f9529fb0a.exe windows x86
2d24f9632e7b0023f6f020ca2bec8aa4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
HeapSize
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetCPInfo
RtlUnwind
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
FindResourceW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetFileAttributesA
HeapAlloc
GetStartupInfoW
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
SetErrorMode
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
FileTimeToSystemTime
GetThreadLocale
VirtualProtect
WritePrivateProfileStringW
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentProcessId
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
lstrcmpW
GetVersionExA
FreeResource
GlobalFree
FormatMessageW
GetModuleHandleA
MulDiv
GetCurrentThread
QueryPerformanceCounter
LocalFree
CloseHandle
LocalAlloc
CreateFileW
ReadFile
CreateThread
DeleteFileA
ResumeThread
SuspendThread
LoadLibraryA
GetCurrentDirectoryW
SetThreadPriority
Sleep
TerminateThread
GetProcessHeap
GetTickCount
HeapFree
GetCurrentProcess
InterlockedDecrement
lstrlenA
GlobalUnlock
GlobalAlloc
GlobalLock
GetModuleFileNameW
GetProcAddress
SetLastError
GetLastError
GetModuleHandleW
lstrcpyW
GetWindowsDirectoryW
WinExec
lstrcatW
MultiByteToWideChar
LoadLibraryW
FreeLibrary
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
LockResource
SizeofResource
LoadResource
GetACP
user32
CopyAcceleratorTableW
CharNextW
CharUpperW
UnregisterClassW
GetSysColorBrush
DestroyMenu
SetRectEmpty
RegisterClipboardFormatW
GetMessageW
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
WindowFromPoint
GetWindowThreadProcessId
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsRectEmpty
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnhookWindowsHookEx
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindowTextLengthW
GetWindow
SetFocus
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
GetMenuState
SendMessageW
GetSystemMetrics
ReleaseDC
CallNextHookEx
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
IntersectRect
UpdateWindow
GetMenuItemID
GetSubMenu
ExitWindowsEx
GetCursorPos
GetMenuItemCount
CheckMenuItem
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
SetRect
GetNextDlgGroupItem
PostThreadMessageW
PostMessageW
InvalidateRgn
GetDC
GetWindowRect
ScreenToClient
EnableWindow
LoadIconW
GetDesktopWindow
CopyRect
IsWindowVisible
GrayStringW
GetWindowTextW
InvalidateRect
DrawTextExW
GetClientRect
TabbedTextOutW
DrawTextW
SetWindowPos
SetWindowLongW
GetParent
LoadImageW
LoadBitmapW
KillTimer
SetTimer
OffsetRect
DispatchMessageW
GetWindowLongW
TranslateMessage
PtInRect
GetFocus
GetSysColor
ReleaseCapture
IsWindow
RedrawWindow
CopyIcon
InflateRect
MessageBeep
LoadCursorW
SetCursor
SetCapture
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetWindowExtEx
GetCharWidthW
StretchDIBits
GetRgnBox
CreateRectRgnIndirect
Rectangle
GetViewportExtEx
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SelectObject
CreateDIBSection
CreateFontW
MoveToEx
LineTo
SetBkMode
CreatePen
CreateFontIndirectW
GetStockObject
GetTextColor
StretchBlt
SetTextColor
DeleteDC
SetBkColor
CreateBitmap
DPtoLP
GetMapMode
GetBkColor
CreateSolidBrush
GetCurrentObject
CreateCompatibleBitmap
ExtTextOutW
PtVisible
Escape
RectVisible
TextOutW
BitBlt
DeleteObject
CreateCompatibleDC
GetObjectW
GetTextExtentPoint32W
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetOpenFileNameW
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
ShellExecuteW
Shell_NotifyIconW
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathFileExistsW
PathAppendW
PathAppendA
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFileExistsA
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
CoTaskMemFree
OleUninitialize
OleInitialize
OleRun
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
CoTaskMemAlloc
oleaut32
SysFreeString
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
GetErrorInfo
SysAllocString
Sections
.text Size: 658KB - Virtual size: 657KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ