PIEImportTest
Static task
static1
Behavioral task
behavioral1
Sample
b4acff9dfa53458bd857d5bf8d00906ce9945b51039dbe4a97ade80d0617bdfb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4acff9dfa53458bd857d5bf8d00906ce9945b51039dbe4a97ade80d0617bdfb.exe
Resource
win10v2004-20220812-en
General
-
Target
b4acff9dfa53458bd857d5bf8d00906ce9945b51039dbe4a97ade80d0617bdfb
-
Size
7.7MB
-
MD5
504e69f807604bd968447bf911a4780f
-
SHA1
0548d169fc7586bfe3c52e6db49100d38190718b
-
SHA256
b4acff9dfa53458bd857d5bf8d00906ce9945b51039dbe4a97ade80d0617bdfb
-
SHA512
2da3b7ac69ec3bf81ece37fe5072c136d1f898a0682abd576e5ee46ef779e7ca3eb437fa5e4b9183939537de217743b7a39456508086dd347d702a3766effe1f
-
SSDEEP
49152:X0ba3xqJQ01xH8JRTXa4HM2zlF+g3VEmJk5M+mmtclQ:kba3xgQ01x89xF+gKmJ0M+mmtclQ
Malware Config
Signatures
Files
-
b4acff9dfa53458bd857d5bf8d00906ce9945b51039dbe4a97ade80d0617bdfb.exe windows x86
c0a5f8447150734b4a34a36b0cda9903
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GlobalDeleteAtom
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
SuspendThread
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
GlobalFlags
GlobalReAlloc
GlobalHandle
LocalReAlloc
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
VirtualProtect
VirtualQuery
GlobalAddAtomA
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitThread
CreateThread
SetStdHandle
GetFileType
SetEnvironmentVariableA
ExitProcess
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetDriveTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileW
QueryDosDeviceA
ReadFile
WriteFile
TlsGetValue
TlsSetValue
TlsAlloc
ConnectNamedPipe
VirtualFree
VirtualAlloc
DisconnectNamedPipe
FlushFileBuffers
TlsFree
GetTempPathA
GetCurrentThread
LocalAlloc
GetSystemTime
CreateProcessA
SearchPathA
TerminateProcess
GetSystemInfo
FormatMessageA
GetFileTime
ExpandEnvironmentStringsA
MoveFileA
CopyFileA
SetFileAttributesA
GetFileAttributesA
CreateNamedPipeA
LocalFree
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
CreateDirectoryA
InitializeCriticalSection
GetStdHandle
GetVersionExA
lstrcatA
lstrcpyA
ResetEvent
SetEvent
FreeResource
GlobalAlloc
ResumeThread
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
GetWindowsDirectoryA
GetModuleFileNameA
WinExec
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
lstrcpynA
GetLocalTime
FindClose
FindNextFileA
DeleteFileA
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateEventA
FreeLibrary
CloseHandle
WaitForSingleObject
SetLastError
Sleep
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetThreadPriority
lstrlenA
GetVersion
GetLastError
MultiByteToWideChar
CompareStringA
CompareStringW
GetEnvironmentVariableA
InterlockedExchange
LockResource
WideCharToMultiByte
SizeofResource
LoadResource
HeapReAlloc
FindResourceA
user32
GetNextDlgTabItem
CreateDialogIndirectParamA
DestroyMenu
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
CharNextA
MapDialogRect
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
PostThreadMessageA
EndDialog
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
CallWindowProcA
OffsetRect
GetWindowPlacement
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SetFocus
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
GetWindowThreadProcessId
GetLastActivePopup
PostQuitMessage
TrackMouseEvent
HideCaret
SetActiveWindow
GetActiveWindow
IsWindowEnabled
GetDesktopWindow
GetFocus
CopyIcon
InflateRect
IsWindow
SetCapture
PtInRect
MessageBeep
DestroyIcon
GetCaretPos
EndPaint
BeginPaint
SetPropA
GetDlgCtrlID
DefWindowProcA
GetPropA
UnregisterClassA
RegisterClassExA
LoadBitmapA
SendMessageA
SetWindowLongA
CharUpperA
GetParent
GetWindowTextA
GetWindowTextLengthA
SendMessageCallbackA
CreateWindowExA
FillRect
DrawFocusRect
SetClassLongA
DrawEdge
ReleaseCapture
ClientToScreen
GetWindowRect
KillTimer
EnableWindow
SetTimer
PostMessageA
InvalidateRect
GetWindowLongA
RedrawWindow
DispatchMessageA
PeekMessageA
TranslateMessage
MessageBoxA
FindWindowA
GetSubMenu
GetCursorPos
TrackPopupMenu
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
LoadIconA
SetForegroundWindow
LoadMenuA
ExitWindowsEx
GetSysColor
CopyRect
DrawTextA
SetWindowRgn
SetCursor
SystemParametersInfoA
SetWindowPos
GetWindowDC
ReleaseDC
LoadCursorA
SetRect
WindowFromPoint
GetCapture
DestroyCursor
GetDC
GetSysColorBrush
IntersectRect
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
ExtSelectClipRgn
CreatePen
SetViewportOrgEx
CreateRectRgnIndirect
GetMapMode
GetRgnBox
PtVisible
TextOutA
Escape
GetStockObject
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
GetClipBox
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreatePatternBrush
GetTextColor
GetBkColor
GetCurrentObject
GetTextExtentPoint32A
SetTextColor
SetBkColor
SetBkMode
CreateDCA
DeleteDC
StretchBlt
CreateCompatibleBitmap
ExtTextOutA
GetTextMetricsA
SelectObject
ExtCreateRegion
GetPixel
SelectClipRgn
BitBlt
CreateCompatibleDC
DeleteObject
CombineRgn
CreateRectRgn
CreateFontIndirectA
CreateSolidBrush
GetDeviceCaps
GetObjectA
RectVisible
msimg32
GradientFill
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comctl32
_TrackMouseEvent
shlwapi
SHDeleteKeyA
PathIsDirectoryA
PathIsUNCA
PathStripToRootA
UrlUnescapeA
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
oledlg
ord8
ole32
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SafeArrayGetElemsize
OleCreateFontIndirect
OleLoadPicture
SysFreeString
SysAllocStringLen
SysAllocString
VariantClear
SysStringLen
VarBstrCmp
SysAllocStringByteLen
VariantChangeType
VariantInit
VariantCopy
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
Sections
.text Size: 840KB - Virtual size: 836KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ