Static task
static1
Behavioral task
behavioral1
Sample
ad33c5b43ab31f04a713159f900116b51d6a0653d7552faf4a6a74341f9be2c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad33c5b43ab31f04a713159f900116b51d6a0653d7552faf4a6a74341f9be2c9.exe
Resource
win10v2004-20221111-en
General
-
Target
ad33c5b43ab31f04a713159f900116b51d6a0653d7552faf4a6a74341f9be2c9
-
Size
516KB
-
MD5
3589739373d6439094c816ecf12299e0
-
SHA1
a413e06a592d88d9f38ed06635c59b7f81309ffb
-
SHA256
ad33c5b43ab31f04a713159f900116b51d6a0653d7552faf4a6a74341f9be2c9
-
SHA512
0ac059d8dbbd675e3168b7b65ba169cf55372b481e49439bcc37125f002ee604ae546114c3dae53334ca88343caae531e7ac99fe35017199df6cbfe3fca17d1f
-
SSDEEP
12288:chUP+by0VZAah5nmhZ0Z+hyA9ZsXiR1DXPy:yK+5VZACyZE+hDZsXiR1zPy
Malware Config
Signatures
Files
-
ad33c5b43ab31f04a713159f900116b51d6a0653d7552faf4a6a74341f9be2c9.exe windows x86
ca55f8ce4a89dc32e9b594f548acc50b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
LoadIconW
TrackPopupMenuEx
DestroyIcon
CreateWindowExW
GetDlgCtrlID
ReleaseCapture
DestroyWindow
ShowWindow
RegisterClassW
IsZoomed
GetMenu
GetClassInfoW
GetCapture
IsWindow
DefWindowProcW
GetWindowTextW
LoadAcceleratorsW
RegisterClassExW
LoadStringW
UpdateWindow
LoadCursorW
GetClassNameW
comdlg32
GetOpenFileNameA
CommDlgExtendedError
comctl32
ord17
ImageList_GetImageCount
ImageList_Remove
CreatePropertySheetPageA
ImageList_DragLeave
InitCommonControlsEx
ImageList_Draw
_TrackMouseEvent
PropertySheetA
ImageList_GetIcon
DestroyPropertySheetPage
ImageList_AddMasked
ImageList_DragEnter
advapi32
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegSetValueExA
GetUserNameA
OpenSCManagerA
RegQueryValueExA
StartServiceA
OpenProcessToken
SetSecurityDescriptorDacl
RegQueryValueA
RegCreateKeyExA
RegEnumValueA
RegOpenKeyExA
RegCreateKeyA
OpenServiceA
AllocateAndInitializeSid
ole32
OleCreateMenuDescriptor
OleIsCurrentClipboard
OleTranslateAccelerator
CoRevokeClassObject
IsAccelerator
CoRegisterMessageFilter
CoGetClassObject
OleDestroyMenuDescriptor
CoTaskMemAlloc
CoFreeUnusedLibraries
shell32
SHGetFolderPathW
ord155
mfc42
ord1576
kernel32
TerminateProcess
TlsFree
GetConsoleCP
VirtualQuery
GetConsoleOutputCP
HeapFree
HeapSize
HeapReAlloc
QueryPerformanceCounter
CreateMutexW
LCMapStringW
GetCommandLineW
RaiseException
GetACP
RtlUnwind
FlushFileBuffers
GetDateFormatA
GetTimeFormatA
InitializeCriticalSectionAndSpinCount
LoadLibraryW
IsDebuggerPresent
GetModuleFileNameW
GetStdHandle
SetFilePointer
GetFileType
SetStdHandle
EnterCriticalSection
LCMapStringA
CreateFileA
GetStartupInfoW
HeapAlloc
CloseHandle
InterlockedDecrement
GetProcAddress
TlsSetValue
WriteConsoleW
LocalFree
WaitForSingleObject
GetSystemTimeAsFileTime
ExitProcess
SetHandleCount
HeapCreate
GetModuleFileNameA
IsValidCodePage
LoadLibraryA
GetTimeZoneInformation
SetUnhandledExceptionFilter
WriteConsoleA
GetModuleHandleA
DeleteCriticalSection
FreeEnvironmentStringsW
InterlockedIncrement
GetStringTypeA
GetTickCount
GetModuleHandleW
SetLastError
GetConsoleMode
GetStartupInfoA
VirtualAlloc
MultiByteToWideChar
GetCurrentProcess
UnhandledExceptionFilter
ReadFile
GetLocaleInfoA
Sleep
WideCharToMultiByte
GetCurrentThreadId
GetStringTypeW
GetEnvironmentStringsW
CompareStringW
GetCurrentProcessId
GetCPInfo
CompareStringA
LeaveCriticalSection
TlsAlloc
SetEnvironmentVariableA
TlsGetValue
GetLastError
GetOEMCP
WriteFile
InterlockedExchange
VirtualFree
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ