Static task
static1
Behavioral task
behavioral1
Sample
b001ac8d1b1c88f98954a655f5c004e4a97a38ea4e97933d84c1b34d5e999c9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b001ac8d1b1c88f98954a655f5c004e4a97a38ea4e97933d84c1b34d5e999c9a.exe
Resource
win10v2004-20220901-en
General
-
Target
b001ac8d1b1c88f98954a655f5c004e4a97a38ea4e97933d84c1b34d5e999c9a
-
Size
121KB
-
MD5
7270b0ac83d6ed322ddb3d70e6d84481
-
SHA1
6b6b18541f47e1e021b802080a62238677341e3b
-
SHA256
b001ac8d1b1c88f98954a655f5c004e4a97a38ea4e97933d84c1b34d5e999c9a
-
SHA512
196a64b5212f5557403be78b6535f341dd2036e08f1214b4c91885cca0f7bef2e4fd6ecb85bf1c0538d4a402bcdf3ebd43caa184fb12efd879703eee0785bc18
-
SSDEEP
3072:IiTa224YBd67BSZgngxyldLpI/dVSGFYSf/9HDhtEg:JTa/jX6mvxIaDFf/W
Malware Config
Signatures
Files
-
b001ac8d1b1c88f98954a655f5c004e4a97a38ea4e97933d84c1b34d5e999c9a.exe windows x86
5d63cb40a20458b065e9b16d0496e3aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
PathFindFileNameW
PathIsDirectoryA
PathCanonicalizeA
PathRemoveFileSpecA
PathAddBackslashW
PathFindExtensionW
PathRemoveFileSpecW
PathAppendW
PathFindExtensionA
PathIsDirectoryW
PathAppendA
PathFileExistsA
PathFindFileNameA
StrStrW
PathCanonicalizeW
PathIsDirectoryEmptyA
PathRemoveBackslashW
PathFileExistsW
PathAddExtensionW
PathIsDirectoryEmptyW
advapi32
RegQueryValueExA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RegCloseKey
gdi32
SaveDC
SetViewportOrgEx
GetStockObject
ExtTextOutW
Escape
SetMapMode
OffsetViewportOrgEx
RectVisible
PtVisible
DeleteObject
SelectObject
GetClipBox
RestoreDC
SetWindowExtEx
ScaleViewportExtEx
SetBkColor
TextOutW
DeleteDC
SetTextColor
GetDeviceCaps
CreateBitmap
ScaleWindowExtEx
SetViewportExtEx
user32
GetMenuItemID
GetKeyState
GetFocus
GetClassLongW
GetClientRect
DestroyMenu
ReleaseDC
TabbedTextOutW
GetMessageTime
GetClassNameW
GetSysColorBrush
GetMenu
ModifyMenuW
DispatchMessageW
MapWindowPoints
RemovePropW
IsIconic
MessageBoxW
SetWindowPos
GetMenuCheckMarkDimensions
PostMessageW
LoadCursorW
GetTopWindow
LoadIconW
LoadBitmapW
GetDC
PeekMessageW
GrayStringW
SetForegroundWindow
IsWindowEnabled
GetWindow
GetClassInfoW
GetSystemMetrics
ValidateRect
SetWindowLongW
PtInRect
CallNextHookEx
UnhookWindowsHookEx
GetPropW
DefWindowProcW
SystemParametersInfoA
EnableWindow
RegisterClassW
GetMessagePos
GetSysColor
GetWindowTextW
GetWindowPlacement
CallWindowProcW
GetForegroundWindow
GetSubMenu
CreateWindowExW
GetParent
SendMessageW
PostQuitMessage
SetMenuItemBitmaps
GetWindowRect
WinHelpW
GetCapture
GetClassInfoExW
AdjustWindowRectEx
GetMenuItemCount
EnableMenuItem
UnregisterClassW
DrawTextW
CopyRect
SetPropW
ClientToScreen
GetDlgCtrlID
SetWindowsHookExW
GetLastActivePopup
DrawTextExW
DestroyWindow
CheckMenuItem
SetWindowTextW
GetWindowLongW
GetMenuState
GetDlgItem
RegisterWindowMessageW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
kernel32
GetACP
TerminateProcess
FindNextFileW
VirtualProtect
InitializeCriticalSection
VirtualFree
GetCPInfo
InterlockedDecrement
LeaveCriticalSection
IsBadReadPtr
CloseHandle
TlsGetValue
GetFullPathNameW
GetStdHandle
VirtualAlloc
TlsFree
GlobalFree
HeapAlloc
WideCharToMultiByte
HeapFree
CopyFileW
LocalReAlloc
TlsGetValue
CopyFileA
GlobalLock
RtlUnwind
HeapSize
EnterCriticalSection
IsBadCodePtr
LocalAlloc
GetStringTypeW
RemoveDirectoryW
LCMapStringW
GetThreadLocale
SetStdHandle
GetVersionExW
DeleteFileA
WriteFile
FindResourceW
SetFileAttributesW
TlsSetValue
GetUserDefaultLangID
FindFirstFileExW
LoadLibraryA
GetLastError
ExitProcess
GetCommandLineW
GetSystemTimeAsFileTime
GetVersion
GetModuleHandleW
ProcessIdToSessionId
OutputDebugStringW
SetHandleCount
FreeEnvironmentStringsA
lstrlenA
GetSystemInfo
lstrcpyW
FlushFileBuffers
GetStringTypeA
GetCommandLineA
GetFileType
FreeLibrary
lstrcatW
ReadFile
SetFileAttributesA
lstrlenW
MultiByteToWideChar
GetOEMCP
CreateDirectoryW
GetShortPathNameA
GetStartupInfoA
MoveFileW
FindNextFileA
FormatMessageW
GetLocaleInfoW
EnumSystemLocalesW
EnumResourceLanguagesA
SizeofResource
VirtualQuery
LCMapStringA
GlobalDeleteAtom
DeleteFileW
LocalFree
GetTempPathW
HeapCreate
GetTickCount
ExitProcess
UnhandledExceptionFilter
GetModuleHandleA
FreeEnvironmentStringsW
GetShortPathNameW
RaiseException
InterlockedExchange
GetEnvironmentStrings
TlsAlloc
FindFirstFileExA
FindClose
GetProcAddress
GlobalHandle
GlobalAlloc
GetModuleFileNameA
lstrcmpW
GetUserDefaultUILanguage
GlobalFlags
GlobalFindAtomW
GetCurrentProcess
CreateFileMappingW
GlobalAddAtomW
InterlockedIncrement
GetEnvironmentStringsW
QueryPerformanceCounter
LockResource
GetSystemDefaultLangID
Sleep
lstrcpynW
HeapDestroy
IsBadWritePtr
OutputDebugStringA
CreateDirectoryA
MoveFileA
LoadResource
SetLastError
SetFilePointer
GetStartupInfoW
SetUnhandledExceptionFilter
DeleteCriticalSection
GetCurrentThreadId
GetFullPathNameA
GetModuleFileNameW
GlobalUnlock
GetLocaleInfoA
EnumUILanguagesW
HeapReAlloc
GetVersionExA
GlobalReAlloc
GetCurrentProcessId
RemoveDirectoryA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
shell32
SHCreateDirectoryExA
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderPathA
SHCreateDirectoryExW
SHGetSpecialFolderPathW
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ