Static task
static1
Behavioral task
behavioral1
Sample
af83acd2f01407cd3e0e34d259d022dc8d89830000f16d0c910d44f1b94eade8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af83acd2f01407cd3e0e34d259d022dc8d89830000f16d0c910d44f1b94eade8.exe
Resource
win10v2004-20220812-en
General
-
Target
af83acd2f01407cd3e0e34d259d022dc8d89830000f16d0c910d44f1b94eade8
-
Size
3.5MB
-
MD5
f114e81a8ff9c992719a77f442cb5213
-
SHA1
333e8dabf2b4c11b97414333f70405dc7ec1d2d9
-
SHA256
af83acd2f01407cd3e0e34d259d022dc8d89830000f16d0c910d44f1b94eade8
-
SHA512
99cc87afb5c2d91906b390acf0497d1bcfae64806798c5edf7f6745476fffbf56a2de40c43ad20f4a4585524affabda3573c5444732926886e0ccea99f1a5e17
-
SSDEEP
49152:xl0XqOpKhowCSHXuC7znzKYR1g9STatW5+WDy5wGjVLpRm4y+1/nA+T:/0XqOWdHL7znzzDg9XtW5+ay5/
Malware Config
Signatures
Files
-
af83acd2f01407cd3e0e34d259d022dc8d89830000f16d0c910d44f1b94eade8.exe windows x86
66ef690d34f6e8c3c2d5edd2ba8a043b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
SetEndOfFile
MoveFileA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
SetEnvironmentVariableA
GetStartupInfoA
GetCommandLineA
ExitProcess
GetDriveTypeA
TerminateProcess
HeapFree
HeapAlloc
SetStdHandle
GetFileType
HeapReAlloc
GetTimeZoneInformation
CreateThread
ExitThread
GetFileInformationByHandle
PeekNamedPipe
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
GetCurrentThreadId
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
TlsAlloc
LocalAlloc
lstrcpynA
SetLastError
LocalFree
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
GlobalSize
GlobalFree
GlobalAlloc
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileSize
SetFilePointer
WriteFile
ReadFile
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreA
GetVersion
GetTempFileNameA
CreateFileA
GetCurrentProcess
CreatePipe
DuplicateHandle
CloseHandle
GetStdHandle
CreateProcessA
GetLastError
GetProfileStringA
lstrlenA
GetSystemTime
CreateDirectoryA
GetCurrentDirectoryA
GetModuleFileNameA
GetTempPathA
DeleteFileA
WritePrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
GetLocalTime
LoadLibraryA
GetProcAddress
SetCurrentDirectoryA
FreeLibrary
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
SendDlgItemMessageA
EndDialog
PostMessageA
DialogBoxParamA
LoadStringA
EnableWindow
GetFocus
shell32
ShellExecuteA
comctl32
ord17
gdi32
SetMapMode
OffsetViewportOrgEx
GetStockObject
GetClipBox
SetTextColor
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectObject
SetBkColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
CreateBitmap
GetObjectA
winspool.drv
EnumPrintersA
DocumentPropertiesA
OpenPrinterA
StartDocPrinterA
AbortPrinter
WritePrinter
EndDocPrinter
ClosePrinter
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1004KB - Virtual size: 1001KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 720KB - Virtual size: 742KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ