Static task
static1
Behavioral task
behavioral1
Sample
ac95df24eac4b328f62a25df47a87ac44386c55f2487eeaa3bd3371ce9754050.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ac95df24eac4b328f62a25df47a87ac44386c55f2487eeaa3bd3371ce9754050.exe
Resource
win10v2004-20221111-en
General
-
Target
ac95df24eac4b328f62a25df47a87ac44386c55f2487eeaa3bd3371ce9754050
-
Size
472KB
-
MD5
0b98f3cb8c57232584d6e5b6fde3ffcc
-
SHA1
5cd61aa98e8f22912192a5bb12c571907eac0819
-
SHA256
ac95df24eac4b328f62a25df47a87ac44386c55f2487eeaa3bd3371ce9754050
-
SHA512
5b4499143dfe047129433bcfe6b8894b66419fb221bcf066bfe9b3189f39313a4fb02ec8998ec51db6d985cf70c366dfdb34ed85928cce6f6b432125c342e4cb
-
SSDEEP
12288:IrgZq8gE4bHRfd74g7b44G/JLwJgqhbhOsJ1FxKqYxXr:ygPYH5d748b4408hIsJjeb
Malware Config
Signatures
Files
-
ac95df24eac4b328f62a25df47a87ac44386c55f2487eeaa3bd3371ce9754050.exe windows x86
226111ae4be27c6a0e1396a39a96c254
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
LockResource
GetCurrentProcessId
SizeofResource
CreateProcessW
lstrlenW
GlobalAlloc
GlobalUnlock
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
HeapCreate
LCMapStringW
GetLastError
InterlockedIncrement
ExitProcess
CreateFileA
TlsSetValue
GetFileType
GetEnvironmentStringsW
CreateEventA
CreateFileW
RemoveDirectoryA
GetProcAddress
WaitForMultipleObjects
FindNextFileA
CreateFileMappingA
CompareStringA
FindFirstFileA
CompareStringW
GetProcessHeap
GetSystemInfo
GlobalLock
DeleteFileW
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
FlushFileBuffers
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
LeaveCriticalSection
GetCurrentThreadId
SetEndOfFile
CloseHandle
VirtualQuery
WriteConsoleA
TerminateProcess
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
MultiByteToWideChar
UnhandledExceptionFilter
GetPrivateProfileStringA
LoadLibraryExA
GetModuleFileNameA
GetVersionExA
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
InterlockedDecrement
SetLastError
FormatMessageA
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
SetEvent
GetStringTypeW
HeapReAlloc
GetCommandLineA
GetSystemTimeAsFileTime
WriteFile
GetStringTypeA
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
ExpandEnvironmentStringsA
LocalAlloc
GetLocaleInfoA
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindFirstFileW
WaitForSingleObject
GetFileAttributesA
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
GetEnvironmentVariableA
RtlUnwind
lstrcpynA
GetACP
GetModuleHandleW
GetVersion
InterlockedExchange
GetEnvironmentStrings
CreateProcessA
UnmapViewOfFile
FindResourceW
VirtualFree
Sleep
FindResourceA
GetConsoleMode
VirtualAlloc
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
ole32
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
gdi32
GetDeviceCaps
DeleteDC
SelectObject
CreateCompatibleDC
SetBkColor
DeleteObject
GetStockObject
SetTextColor
oleaut32
VariantInit
SysFreeString
VariantClear
user32
SetWindowPos
ReleaseDC
PostQuitMessage
SetForegroundWindow
DefWindowProcA
SetCursor
CallWindowProcA
InvalidateRect
IsWindowVisible
GetSysColor
GetFocus
ScreenToClient
EndDialog
GetDesktopWindow
LoadIconA
LoadCursorA
ClientToScreen
GetDlgItem
CreateWindowExA
CheckMenuItem
SetWindowTextA
SetWindowLongA
PostMessageA
GetWindowRect
GetSystemMetrics
BeginPaint
SetFocus
EndPaint
FillRect
SetTimer
GetWindowLongA
RegisterClassA
EnableMenuItem
LoadStringA
IsWindowEnabled
TranslateMessage
PeekMessageA
EnableWindow
ShowWindow
GetParent
DestroyWindow
GetKeyState
GetClientRect
SendMessageA
GetCursorPos
GetDC
DispatchMessageA
IsWindow
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 440KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ