Static task
static1
Behavioral task
behavioral1
Sample
99ae9134bba9c6a363bae9b1d91387921e382ad1aa693f0cc271740d1bb11a8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99ae9134bba9c6a363bae9b1d91387921e382ad1aa693f0cc271740d1bb11a8c.exe
Resource
win10v2004-20220812-en
General
-
Target
99ae9134bba9c6a363bae9b1d91387921e382ad1aa693f0cc271740d1bb11a8c
-
Size
175KB
-
MD5
8aff2c81e776d4fdb2014a7a3f6e4666
-
SHA1
2e6c589fcd1ac97c20e983335b68069e278898fd
-
SHA256
99ae9134bba9c6a363bae9b1d91387921e382ad1aa693f0cc271740d1bb11a8c
-
SHA512
82bf3014d54c3dd7532b6a03a2ccd1d6bf6c7637d23acfd9c47bdac9382beb84e58918d59d2a326824e225c855524986e79264fe5cf45eb10128f5ed15039dc2
-
SSDEEP
3072:WsMqH9m6vk7Xb1TNowhdqmfugr66EMPC9z3r3/2k1vrPUxNt7:WMEfb1JHBfugmoCp3r3/2eYxH7
Malware Config
Signatures
Files
-
99ae9134bba9c6a363bae9b1d91387921e382ad1aa693f0cc271740d1bb11a8c.exe windows x86
cec0c47e24b58a2d8f6286a3ab743c2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
log
memmove
memcpy
malloc
kernel32
lstrcpynA
lstrlenA
GetDiskFreeSpaceA
GetFileAttributesA
VirtualAlloc
EnterCriticalSection
GetFileType
GetLocaleInfoA
FindFirstFileA
GlobalAddAtomA
ExitProcess
LocalFree
MoveFileA
GetUserDefaultLCID
VirtualAllocEx
CloseHandle
GetVersionExA
FindResourceA
SetHandleCount
GetModuleFileNameA
GetCurrentThread
Sleep
CreateEventA
VirtualQuery
LoadResource
LoadLibraryA
EnumCalendarInfoA
HeapFree
SetThreadLocale
WriteFile
MoveFileExA
LockResource
FindClose
GetEnvironmentStrings
lstrcmpiA
InitializeCriticalSection
SetEndOfFile
GetOEMCP
SetEvent
GetCurrentProcess
HeapDestroy
ExitThread
GetStringTypeA
LocalAlloc
HeapAlloc
GetCommandLineA
LoadLibraryExA
VirtualFree
lstrcatA
GetModuleHandleA
CreateThread
GetACP
GetLastError
CompareStringA
SetLastError
SetFilePointer
lstrcpyA
GetCurrentThreadId
FreeResource
LocalReAlloc
DeleteFileA
GetCPInfo
GetTickCount
ResetEvent
GlobalFindAtomA
user32
GetClientRect
DrawIcon
GetDesktopWindow
DispatchMessageW
EndDeferWindowPos
GetMenuStringA
BeginPaint
FillRect
SetWindowLongA
IsWindowVisible
EqualRect
GetMenuState
IsWindowEnabled
GetMenuItemInfoA
GetKeyNameTextA
HideCaret
GetMenuItemCount
BeginDeferWindowPos
CharLowerBuffA
IsMenu
DefWindowProcA
GetWindow
GetWindowTextA
DrawEdge
ShowWindow
SetWindowPos
CharToOemA
EnumThreadWindows
GetScrollRange
GetScrollInfo
ClientToScreen
GetForegroundWindow
SystemParametersInfoA
EnumChildWindows
GetMenu
DrawFrameControl
DrawTextA
CheckMenuItem
CreateWindowExA
SetCursor
GetSysColor
DeferWindowPos
SetTimer
DefFrameProcA
EndPaint
GetSysColorBrush
RegisterClassA
GetClipboardData
DrawMenuBar
GetMessagePos
EnableWindow
CallWindowProcA
GetCursorPos
CreateIcon
GetCursor
SetWindowTextA
GetDCEx
GetScrollPos
DefMDIChildProcA
FindWindowA
DispatchMessageA
GetFocus
EnableMenuItem
GetActiveWindow
shell32
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetFolderPathA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 125KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE