Static task
static1
Behavioral task
behavioral1
Sample
aa32a10558a51362446fc7b9580dcb0c2b7e0da9dfdc94798c4c703bb277f222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa32a10558a51362446fc7b9580dcb0c2b7e0da9dfdc94798c4c703bb277f222.exe
Resource
win10v2004-20220812-en
General
-
Target
aa32a10558a51362446fc7b9580dcb0c2b7e0da9dfdc94798c4c703bb277f222
-
Size
629KB
-
MD5
822b3b8a1f83b48ddf8960b4b8d4cbdf
-
SHA1
08392854f32ebac7c34704ce9717371f1b180fbb
-
SHA256
aa32a10558a51362446fc7b9580dcb0c2b7e0da9dfdc94798c4c703bb277f222
-
SHA512
d3ccb8853883ac87fbcc5e1781130445a4167e5e897f9068900da215e8e36c5ab14163cc62d270e7353a5313a9f0fa3cde64d3002790e2a759b372351a25539d
-
SSDEEP
3072:7NhWxBXgyF9a19FBYSF+zIy77z1F9Ykz6xvGgdWI2L:X6vFm3F+37tI+UcT
Malware Config
Signatures
Files
-
aa32a10558a51362446fc7b9580dcb0c2b7e0da9dfdc94798c4c703bb277f222.exe windows x86
6862c5ef8e775e2c76e5c70ee90301e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
GetSystemDirectoryA
GetComputerNameW
GetCurrentDirectoryW
TerminateProcess
ExitProcess
GetCurrentProcess
GlobalAlloc
GetModuleFileNameA
ExitThread
LCMapStringA
GetEnvironmentStrings
GetUserDefaultLCID
GetVersion
GetThreadSelectorEntry
GetFullPathNameA
GetComputerNameA
GetModuleHandleA
GetWindowsDirectoryA
PeekConsoleInputA
CreateEventA
CreateRemoteThread
ReadProcessMemory
GetVersion
OpenProcess
LoadLibraryA
LoadModule
CreateFiber
LocalAlloc
GetExitCodeThread
CreateToolhelp32Snapshot
CreateProcessA
CloseHandle
EnterCriticalSection
CreateFileA
MoveFileA
WaitForSingleObject
WriteProcessMemory
GetCurrentProcessId
Process32First
GetProcAddress
LocalHandle
FreeLibraryAndExitThread
OutputDebugStringA
GetThreadContext
GetFileSize
Process32Next
GetFullPathNameW
user32
FlashWindow
CharToOemW
RegisterClassExA
DialogBoxParamW
CreateWindowExA
GetDlgItemTextA
DdeGetLastError
DispatchMessageA
FillRect
DrawTextExW
CharNextW
ClientToScreen
GetMenu
GetMenuItemID
GetMessageA
GetForegroundWindow
DispatchMessageA
GetQueueStatus
ShowWindow
TranslateMessage
DefWindowProcA
FreeDDElParam
CharToOemBuffA
GetKeyNameTextW
GetSystemMenu
DefWindowProcA
DrawCaption
DialogBoxIndirectParamW
CharUpperBuffW
AppendMenuA
DdeQueryStringW
GetKeyState
UpdateWindow
CharLowerW
DefDlgProcA
CreateCaret
CreateDialogParamA
advapi32
GetTokenInformation
SetTokenInformation
CryptAcquireContextA
SetKernelObjectSecurity
RegDeleteKeyA
SetEntriesInAclA
CryptSetHashParam
RegEnumValueW
AllocateAndInitializeSid
SetSecurityDescriptorSacl
GetSecurityInfo
InitiateSystemShutdownA
EnableTrace
RegFlushKey
PrivilegeCheck
OpenEventLogW
RegOpenKeyExW
ControlTraceW
SetNamedSecurityInfoA
GetSecurityDescriptorSacl
CryptGenRandom
RegSetValueA
shell32
Shell_NotifyIconW
ShellExecuteA
StrRChrA
SheGetDirA
SHGetFileInfoA
SHBindToParent
PrintersGetCommand_RunDLL
SHPathPrepareForWriteW
gdi32
FillRgn
GetCharWidth32W
Arc
GetObjectType
CreateMetaFileW
OffsetViewportOrgEx
ExtSelectClipRgn
CreateEnhMetaFileW
GetEnhMetaFileW
CreateFontIndirectW
StartDocA
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 384KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE