Static task
static1
Behavioral task
behavioral1
Sample
ab4e6d0b44c46db592878c3d01bc8a730b476b424dab0883234a7d169e9947fb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab4e6d0b44c46db592878c3d01bc8a730b476b424dab0883234a7d169e9947fb.exe
Resource
win10v2004-20221111-en
General
-
Target
ab4e6d0b44c46db592878c3d01bc8a730b476b424dab0883234a7d169e9947fb
-
Size
712KB
-
MD5
93af804eaa328c23e04d24909580cf37
-
SHA1
d9c6644d080eefa9160df633c940996d4668aa6d
-
SHA256
ab4e6d0b44c46db592878c3d01bc8a730b476b424dab0883234a7d169e9947fb
-
SHA512
ead2ed74543b90f9123f3290ba659ed8646a7127e1f6d3ddcb082d33a5a20ed982faec4bc4eabf125583dcfc3f842b156cfcf94a7cad4f362ce0fecccc233e0f
-
SSDEEP
12288:usUEV+94OAcrn4DjLzciLLixYfd+jqFU51jQ4iEoWbfEaBZ:ui+J5z4fL4YkjUU4WZ
Malware Config
Signatures
Files
-
ab4e6d0b44c46db592878c3d01bc8a730b476b424dab0883234a7d169e9947fb.exe windows x86
eb34cb51d5ba169d32c913fa1cbddaba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontA
GetOpenFileNameA
GetSaveFileNameA
PageSetupDlgA
ChooseColorA
PrintDlgA
comctl32
CreatePropertySheetPageA
_TrackMouseEvent
ImageList_DragShowNolock
ImageList_Remove
ImageList_Destroy
ImageList_Add
ImageList_GetImageCount
PropertySheetA
ImageList_Create
InitCommonControlsEx
ImageList_SetBkColor
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_Replace
ImageList_GetIcon
ImageList_DragEnter
ImageList_Draw
ord17
DestroyPropertySheetPage
ImageList_GetImageInfo
ole32
OleRegEnumVerbs
CreateItemMoniker
OleRegGetMiscStatus
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
shell32
DragQueryFileA
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
SHGetPathFromIDListA
ShellExecuteW
DragFinish
ord155
gdi32
CreateDCW
GetObjectW
GetDeviceCaps
DeleteObject
DeleteDC
user32
RegisterClassW
GetMessagePos
RegisterClipboardFormatW
CallWindowProcW
ReleaseDC
GetWindowPlacement
DispatchMessageW
EnableWindow
SetClipboardData
SystemParametersInfoW
DefWindowProcW
GetKeyState
DestroyMenu
PeekMessageW
ShowWindow
LoadCursorW
SetDlgItemInt
GetSystemMetrics
GetWindow
PtInRect
SetTimer
SetMenuItemInfoW
LoadBitmapW
OffsetRect
SetRectEmpty
EqualRect
TrackPopupMenuEx
WindowFromPoint
KillTimer
GetDlgItem
GetCursorPos
InvalidateRect
GetSubMenu
GetActiveWindow
GetMenuStringW
CreateDialogIndirectParamW
EnumWindows
GetClassLongW
IsWindow
SetWindowLongW
FillRect
PostQuitMessage
BeginPaint
TrackPopupMenu
GetClassNameW
UnpackDDElParam
GetMenuState
GetMenuItemID
GetDlgItemInt
SendDlgItemMessageA
DrawFrameControl
EnableMenuItem
GetSysColorBrush
UpdateWindow
AttachThreadInput
SendMessageTimeoutW
SetCursor
SetMenuDefaultItem
GetWindowThreadProcessId
DrawTextW
DrawStateW
GetLastActivePopup
OpenClipboard
MessageBeep
DestroyWindow
IsZoomed
IntersectRect
MoveWindow
GetPropW
ScreenToClient
GetMenuItemCount
SetPropW
SetScrollPos
PostMessageW
DestroyIcon
GetDoubleClickTime
RegisterClassExW
CloseClipboard
IsIconic
GetWindowLongW
SetWindowPos
SetCapture
SetActiveWindow
GetWindowDC
SetWindowPlacement
TranslateMessage
SendMessageW
GetFocus
SetMenuItemBitmaps
CreateWindowExW
EndPaint
GetDC
SetWindowTextW
SendMessageA
SetParent
SetFocus
GetMenu
LoadIconW
CreatePopupMenu
LoadStringW
BringWindowToTop
GetParent
RegisterWindowMessageW
RemovePropW
FindWindowW
SetForegroundWindow
MessageBoxW
GetMenuItemInfoW
ClientToScreen
RedrawWindow
IsWindowEnabled
GetClientRect
CheckMenuItem
IsWindowVisible
IsChild
LockWindowUpdate
kernel32
RtlUnwind
UnhandledExceptionFilter
OpenMutexW
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetModuleFileNameA
HeapFree
GetCommandLineA
DeleteCriticalSection
GetVersionExA
InitializeCriticalSection
SetFilePointer
GetStringTypeA
IsDebuggerPresent
GetCPInfo
GetProcAddress
IsBadCodePtr
LeaveCriticalSection
GetSystemTimeAsFileTime
LCMapStringA
GetTickCount
FlushFileBuffers
HeapReAlloc
ReadFile
GetTimeFormatA
GetStringTypeW
GetStartupInfoW
VirtualQuery
VirtualFree
RaiseException
HeapDestroy
GetFileType
VirtualAlloc
GetLastError
GetLocaleInfoA
GetDateFormatA
ExitProcess
WaitForSingleObject
SetLastError
MultiByteToWideChar
LCMapStringW
GetSystemInfo
CreateMutexW
TlsSetValue
GetCurrentProcess
CreateDirectoryW
LoadLibraryW
GetStartupInfoA
VirtualProtect
GetACP
CloseHandle
CreateFileA
EnterCriticalSection
TerminateProcess
SetEnvironmentVariableA
HeapCreate
TlsFree
InterlockedExchange
GetModuleFileNameW
GetCommandLineW
SetHandleCount
LoadLibraryA
GetModuleHandleA
GetModuleHandleW
FindNextFileW
GetOEMCP
WriteFile
GetStdHandle
TlsGetValue
SetStdHandle
CompareStringA
GetCurrentProcessId
CompareStringW
GetFileSize
FreeEnvironmentStringsA
HeapAlloc
TlsAlloc
WideCharToMultiByte
GetCurrentThreadId
FindClose
DeleteFileW
GlobalAlloc
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetTimeZoneInformation
HeapSize
shlwapi
PathIsDirectoryA
PathFindExtensionA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ