Static task
static1
Behavioral task
behavioral1
Sample
ade35ddce47a754242d67b184321225a3dc9533a3f893d56a7a5191d4712479a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ade35ddce47a754242d67b184321225a3dc9533a3f893d56a7a5191d4712479a.exe
Resource
win10v2004-20220901-en
General
-
Target
ade35ddce47a754242d67b184321225a3dc9533a3f893d56a7a5191d4712479a
-
Size
1.5MB
-
MD5
e5a6d5fd6a1087e52e50ccd5b6a175a0
-
SHA1
676695a402b4f58e7a678c38718ff13f87f1fd73
-
SHA256
ade35ddce47a754242d67b184321225a3dc9533a3f893d56a7a5191d4712479a
-
SHA512
83a2a24bbb6477ead4ed2c6be98ea08fbb9942013953f436f062073dbd80ca3e0799a566ddb48b77d15194a726ea3fc069ec1a200a3fe10dce5d21ca33f83c02
-
SSDEEP
24576:abAMkYsOEqsy4shX/eK1J1gNek8ayTLAsmixalHFKcXIpsw5dNykvC:abAMkYs/qUshX/eK1J2K75eL
Malware Config
Signatures
Files
-
ade35ddce47a754242d67b184321225a3dc9533a3f893d56a7a5191d4712479a.exe windows x86
14155420f5ac40654ed4acd8bdaca32f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetA
CreateToolbarEx
ord17
user32
SetCursor
SetScrollPos
SetScrollRange
ClientToScreen
GetWindowRect
DrawMenuBar
SetMenu
AppendMenuA
CreateMenu
GetDialogBaseUnits
ReleaseDC
GetDC
GetParent
SetCursorPos
GetKeyState
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetCursorPos
PeekMessageA
IsDialogMessageA
GetMessageA
ShowCursor
GetCursor
CreatePopupMenu
DeleteMenu
GetMenuItemCount
GetMenu
EnableMenuItem
DestroyMenu
TrackPopupMenuEx
DialogBoxIndirectParamA
EndDialog
SendDlgItemMessageA
CreateDialogIndirectParamA
GetDlgItem
SetActiveWindow
FillRect
SetWindowLongA
GetActiveWindow
IsWindowEnabled
IsWindow
GetNextDlgTabItem
ShowOwnedPopups
GetLastActivePopup
SetWindowsHookExA
IsWindowVisible
ValidateRect
CallNextHookEx
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
UnhookWindowsHookEx
SetWindowContextHelpId
GetWindow
SetWindowPos
MapDialogRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
LoadCursorA
ShowScrollBar
GetClassLongA
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
GetMenuItemID
GetSubMenu
GetClassInfoA
wsprintfA
SetFocus
GetCapture
IsChild
GetTopWindow
GetScrollPos
GetScrollRange
SetScrollInfo
GetScrollInfo
ScrollWindow
EndDeferWindowPos
CopyRect
BeginDeferWindowPos
DeferWindowPos
EqualRect
ScreenToClient
AdjustWindowRectEx
GetSysColor
MapWindowPoints
PostThreadMessageA
RegisterClipboardFormatA
LockWindowUpdate
GetDCEx
InvertRect
SetCapture
InflateRect
WindowFromPoint
KillTimer
SetTimer
GetTabbedTextExtentA
FindWindowA
CharUpperA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
LoadStringA
GetSysColorBrush
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowDC
BeginPaint
EndPaint
SendMessageA
MoveWindow
MessageBoxA
PostQuitMessage
DefWindowProcA
UpdateWindow
ShowWindow
CreateWindowExA
GetSystemMetrics
RegisterClassA
LoadIconA
GetWindowLongA
EnableWindow
DestroyWindow
PostMessageA
GetFocus
GetClientRect
SetPropA
GetPropA
WinHelpA
GetClassNameA
GetSystemMenu
IsRectEmpty
SetParent
IsZoomed
BringWindowToTop
UnpackDDElParam
ReuseDDElParam
LoadMenuA
GetDesktopWindow
ReleaseCapture
LoadAcceleratorsA
SetRectEmpty
InvalidateRect
PtInRect
SetRect
DestroyCursor
SetWindowTextA
SetDlgItemTextA
UnregisterClassA
gdi32
SetViewportOrgEx
CombineRgn
SetRectRgn
GetMapMode
GetWindowOrgEx
GetTextFaceA
GetROP2
GetBkMode
GetTextAlign
GetPolyFillMode
GetStretchBltMode
GetNearestColor
LPtoDP
GetTextColor
Escape
ExtTextOutA
RectVisible
PtVisible
CreatePatternBrush
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
GetCurrentPositionEx
IntersectClipRect
ExcludeClipRect
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetStockObject
SetStretchBltMode
SetPolyFillMode
RestoreDC
SaveDC
CreateFontIndirectA
GetCharWidthA
StretchDIBits
GetTextMetricsA
CreateDCA
AbortDoc
GetViewportOrgEx
DPtoLP
GetObjectA
GetClipBox
CreateBitmap
SetAbortProc
StartDocA
StartPage
EndPage
EndDoc
GetTextExtentPoint32A
SetTextAlign
SetBkMode
SetTextColor
SetBkColor
TextOutA
Polygon
Rectangle
MoveToEx
LineTo
SetPixelV
GetDIBits
SetDIBits
DeleteDC
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
SetROP2
SetMapMode
SelectClipRgn
CreateCompatibleBitmap
PatBlt
CreateCompatibleDC
CreateDIBitmap
SelectObject
CreateFontA
GetBkColor
GetDeviceCaps
BitBlt
DeleteObject
kernel32
MultiByteToWideChar
LeaveCriticalSection
GlobalReAlloc
lstrcatA
GetVersion
DebugBreak
WideCharToMultiByte
GetStdHandle
SetLastError
GlobalFlags
MulDiv
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
lstrcpynA
GetFileAttributesA
FreeLibrary
RaiseException
InterlockedIncrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
InterlockedDecrement
WaitForSingleObject
GetModuleFileNameA
GlobalDeleteAtom
lstrcmpiA
GetCurrentThreadId
lstrcmpA
LockResource
FindResourceA
LoadResource
CloseHandle
GetCurrentProcessId
GetComputerNameA
SetStdHandle
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetLogicalDrives
GetSystemTimeAsFileTime
GetSystemTime
GetTimeZoneInformation
HeapSize
HeapReAlloc
TerminateProcess
FindNextFileA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetDriveTypeA
HeapAlloc
HeapFree
ExitProcess
GetStartupInfoA
RtlUnwind
GetCommandLineA
SetConsoleCtrlHandler
GetACP
CreateProcessA
GetFileInformationByHandle
GetTempPathA
CreateMutexA
CreateFileMappingA
MapViewOfFile
VirtualQuery
CreateFileA
GetVersionExA
GetThreadLocale
GetFileType
GetLocalTime
Sleep
InterlockedExchange
ReleaseMutex
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
FormatMessageA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetVolumeInformationA
FindFirstFileA
FindClose
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DuplicateHandle
GetOEMCP
GetCPInfo
GetModuleHandleA
GetProcessVersion
GetCurrentDirectoryA
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GlobalAlloc
GetProcAddress
LoadLibraryA
lstrlenA
CopyFileA
DeleteFileA
GlobalFree
GlobalUnlock
GlobalLock
GetThreadPriority
SetThreadPriority
SetPriorityClass
GetCurrentThread
GetPriorityClass
GetCurrentProcess
DeviceIoControl
comdlg32
ChooseColorA
PrintDlgA
CommDlgExtendedError
GetFileTitleA
ChooseFontA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegEnumValueA
SetFileSecurityA
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
GetFileSecurityA
shell32
DragQueryFileA
DragFinish
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CoTaskMemAlloc
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
SysFreeString
SysAllocString
VariantChangeType
VariantCopy
VariantTimeToSystemTime
SysAllocStringLen
VariantClear
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_TEXT_HA Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ