Static task
static1
Behavioral task
behavioral1
Sample
acc15505f98320b944ce4bd0753340ac332eb7facce6f58c2ab7b9d8ec560423.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acc15505f98320b944ce4bd0753340ac332eb7facce6f58c2ab7b9d8ec560423.exe
Resource
win10v2004-20221111-en
General
-
Target
acc15505f98320b944ce4bd0753340ac332eb7facce6f58c2ab7b9d8ec560423
-
Size
440KB
-
MD5
67bce33248a8db8ed46b972eec252ee7
-
SHA1
004f7790e804bca6df3214481295c409bc4d90af
-
SHA256
acc15505f98320b944ce4bd0753340ac332eb7facce6f58c2ab7b9d8ec560423
-
SHA512
b5733bf7caa7f4bad453fb580e40244873280ff9bf6d64382a80bb9fefdf1d07b707dfca53bab2567c492c67263529c5df37f43e8b3af37b3ee187c9f115e4c5
-
SSDEEP
6144:Du/b+9YX0d0LBLtR/rQZo9luMLUr5OAHwkC+u1PigRjSRGJvRYE:a/b+9YXLF8Zfr5XwkCDPHJvRD
Malware Config
Signatures
Files
-
acc15505f98320b944ce4bd0753340ac332eb7facce6f58c2ab7b9d8ec560423.exe windows x86
b8fbc506787e851a7a42ded19813c2e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootW
PathAppendW
PathFindFileNameW
StrCatW
SHGetValueW
SHSetValueW
PathFileExistsW
PathIsUNCW
wininet
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetOpenW
kernel32
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleW
InterlockedDecrement
GetVersion
GetFileAttributesW
GetFileTime
GetModuleHandleA
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
ExitProcess
TerminateProcess
GlobalReAlloc
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetFileType
SetHandleCount
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
ReleaseSemaphore
CreateSemaphoreW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
LocalFree
FileTimeToLocalFileTime
GetCurrentThreadId
GetLocalTime
FileTimeToSystemTime
FormatMessageW
CompareStringW
WideCharToMultiByte
ReleaseMutex
InterlockedCompareExchange
WaitForSingleObject
InterlockedIncrement
FindClose
FindNextFileW
FindFirstFileW
Sleep
CreateDirectoryW
GetLastError
CreateMutexW
SetLastError
RemoveDirectoryW
DeleteFileW
ResumeThread
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessW
CloseHandle
lstrlenW
WriteFile
GetModuleFileNameW
CreateFileW
GetTempPathW
FreeLibrary
GetCurrentProcessId
GetProcAddress
LoadLibraryW
GetComputerNameW
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetVersionExW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
UnhandledExceptionFilter
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
EnableWindow
DispatchMessageW
TranslateMessage
SetMessageExtraInfo
GetMessageW
SetTimer
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostQuitMessage
GetMessageExtraInfo
MessageBoxW
wsprintfW
RegisterWindowMessageW
ClientToScreen
UnregisterClassA
gdi32
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
DeleteDC
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitializeEx
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 352KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ