Static task
static1
Behavioral task
behavioral1
Sample
caadbac55101b39cd24b11ba474b1cb65a9476e167caa36cc15e8322e0ae55a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
caadbac55101b39cd24b11ba474b1cb65a9476e167caa36cc15e8322e0ae55a7.exe
Resource
win10v2004-20220812-en
General
-
Target
caadbac55101b39cd24b11ba474b1cb65a9476e167caa36cc15e8322e0ae55a7
-
Size
229KB
-
MD5
df147e980568a18f42bd94e7520bc8ff
-
SHA1
6713491d2be3399487afb036c37a901143bf8ace
-
SHA256
caadbac55101b39cd24b11ba474b1cb65a9476e167caa36cc15e8322e0ae55a7
-
SHA512
4888ba33dcaf1d779f0de5e8c0e9b602cfc616f2c1935197986a011467200aab3f23efce47fa6ed650bdd8d8f9a02c687454d330455a219884ab255f8aaadf03
-
SSDEEP
6144:K2eNb6shvZ9S6p6fU2bcxf4wmoAw9X31dnABFqHBYKkTPtXLL:K2eN2snk6p6fU2bcxAwYw9X/nAihsTP1
Malware Config
Signatures
Files
-
caadbac55101b39cd24b11ba474b1cb65a9476e167caa36cc15e8322e0ae55a7.exe windows x86
2084d13bab8f00d7674291deed39f419
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassA
DlgDirListComboBoxW
CreateDialogIndirectParamA
DispatchMessageW
GetUpdateRect
DispatchMessageA
WindowFromDC
SetLastErrorEx
CloseClipboard
TileWindows
EnumDisplaySettingsExW
SetWindowsHookA
DlgDirListW
InSendMessage
GetClipboardSequenceNumber
GetLastActivePopup
EnumWindows
GetWindowRgn
SetMenuItemBitmaps
IsCharLowerA
GetClassInfoExW
CopyIcon
GetClipboardFormatNameW
shell32
ShellAboutA
ShellExecuteExA
DragQueryFileW
DoEnvironmentSubstW
SHGetNewLinkInfo
SHUpdateRecycleBinIcon
SHLoadInProc
SHChangeNotify
SHFileOperation
DragQueryFileAorW
SHGetFileInfo
DoEnvironmentSubstA
SHGetInstanceExplorer
SHEmptyRecycleBinW
SHGetPathFromIDList
comdlg32
GetOpenFileNameA
GetFileTitleW
ChooseFontW
GetFileTitleA
ReplaceTextA
PrintDlgA
PageSetupDlgW
ChooseFontA
LoadAlterBitmap
ReplaceTextW
FindTextA
PrintDlgW
FindTextW
ChooseColorA
PageSetupDlgA
GetOpenFileNameW
GetSaveFileNameW
gdi32
GetDCOrgEx
DPtoLP
CreatePalette
GetICMProfileW
GetTextMetricsW
GetDIBits
PolyPolygon
CancelDC
GetEnhMetaFilePaletteEntries
GetCharWidth32A
GetTextColor
PolyBezier
GetGlyphOutlineA
StartDocA
StretchDIBits
GetDIBColorTable
SwapBuffers
kernel32
LoadLibraryA
GetOEMCP
HeapAlloc
GetCommandLineA
FreeEnvironmentStringsW
GetCurrentThread
GetTickCount
GetCPInfo
HeapFree
GetSystemInfo
MultiByteToWideChar
GetEnvironmentStrings
LCMapStringA
GetCurrentThreadId
QueryPerformanceCounter
FreeEnvironmentStringsA
CompareStringW
HeapCreate
GetEnvironmentStringsW
GetTimeFormatA
TlsGetValue
GetCurrentProcessId
RtlUnwind
GetLocaleInfoW
EnumSystemLocalesA
LeaveCriticalSection
GetCommandLineW
SetHandleCount
TlsAlloc
HeapDestroy
GetModuleFileNameW
ExitProcess
TerminateProcess
GetUserDefaultLCID
VirtualQuery
GetModuleHandleA
GetVersionExA
IsValidLocale
WideCharToMultiByte
CompareStringA
WriteFile
GetTempPathW
GetSystemTimeAsFileTime
GetStartupInfoW
VirtualFree
InterlockedExchange
GetStartupInfoA
TlsSetValue
GetLastError
TlsFree
DeleteCriticalSection
HeapSize
InitializeCriticalSection
GetProcAddress
GetStringTypeA
VirtualAlloc
GetModuleFileNameA
GetPriorityClass
LCMapStringW
FileTimeToSystemTime
GetACP
GetTimeZoneInformation
GetFileType
HeapReAlloc
GetLocaleInfoA
IsValidCodePage
GlobalFix
IsBadWritePtr
GetCurrentProcess
UnhandledExceptionFilter
GetDateFormatA
lstrcpyn
SetEnvironmentVariableA
GetStdHandle
VirtualProtect
SetLastError
EnterCriticalSection
GetStringTypeW
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ