Static task
static1
Behavioral task
behavioral1
Sample
a5f1c68af99d8c4c04fc27cfdf309cf06990a583370801eac4c444820c0af9af.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5f1c68af99d8c4c04fc27cfdf309cf06990a583370801eac4c444820c0af9af.exe
Resource
win10v2004-20220812-en
General
-
Target
a5f1c68af99d8c4c04fc27cfdf309cf06990a583370801eac4c444820c0af9af
-
Size
179KB
-
MD5
ca573c36c5b7c822b85e1c068c8dd387
-
SHA1
de12e74f86f13745198af70abfec5d926169bf54
-
SHA256
a5f1c68af99d8c4c04fc27cfdf309cf06990a583370801eac4c444820c0af9af
-
SHA512
afec12d3206ba10cac2760a711dc5aa59c35dd3689c741d2a468be209b900a17e35afd597e3894a2b07b53ea80f146849e3f102914072e1fcb6c6fe0f08057fa
-
SSDEEP
3072:5uX4QEh2pSJQKW/OtYtvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvz:5XNuOtOSG9
Malware Config
Signatures
Files
-
a5f1c68af99d8c4c04fc27cfdf309cf06990a583370801eac4c444820c0af9af.exe windows x86
1290b600bf2fe1a4384d0d962c455c02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90u
ord5653
ord1492
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5167
ord5632
ord4347
ord4494
ord5867
ord4234
ord6703
ord899
ord601
ord306
ord4996
ord5680
ord5663
ord6018
ord3115
ord4905
ord3670
ord615
ord654
ord639
ord2208
ord6482
ord4211
ord794
ord589
ord4043
ord4967
ord5322
ord2069
ord4131
ord595
ord3489
ord2274
ord611
ord4681
ord4910
ord4348
ord2891
ord2277
ord4081
ord4080
ord3286
ord2764
ord2893
ord2774
ord3140
ord2966
ord4728
ord3112
ord2983
ord4682
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord4510
ord1601
ord2103
ord3528
ord4664
ord374
ord933
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord4652
ord1493
ord4345
ord1751
ord2087
ord3217
ord3515
ord1333
ord1533
ord4741
ord6604
ord4516
ord2360
ord4631
ord5182
ord744
ord524
ord6579
ord5008
ord4000
ord1938
ord1108
ord3496
ord4654
ord2771
ord1667
ord5674
ord5676
ord4071
ord2447
ord1754
ord6411
ord3355
ord1665
ord3486
ord3543
ord2106
ord2537
ord1183
ord600
ord296
ord1137
ord1250
ord1254
ord799
ord1272
ord801
msvcr90
memcpy_s
free
_purecall
toupper
memmove_s
_wcslwr_s
wcsnlen
wcsrchr
memset
wcschr
memcpy
__CxxFrameHandler3
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_localtime64_s
_time64
strncmp
swprintf_s
wcstoul
wcscpy_s
_swprintf
kernel32
GetVersionExW
GetDriveTypeW
EnterCriticalSection
GetVersion
InterlockedExchange
DeviceIoControl
WriteFile
ReadFile
SetFilePointer
CloseHandle
LoadResource
LockResource
SizeofResource
FindResourceW
FindResourceExW
GetModuleFileNameW
CreateDirectoryW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
SetErrorMode
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
LeaveCriticalSection
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
GetVolumeInformationW
GetLogicalDrives
GetTickCount
LoadLibraryW
GetProcAddress
FreeLibrary
CreateMutexW
GetCurrentThread
GetCurrentProcess
SetLastError
GetLastError
CreateFileW
user32
EnableWindow
LoadIconW
MessageBoxW
PtInRect
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
SetForegroundWindow
ShowWindow
FindWindowW
gdi32
DeleteDC
comdlg32
GetSaveFileNameW
advapi32
GetSidLengthRequired
OpenThreadToken
OpenProcessToken
DuplicateToken
CheckTokenMembership
IsValidSid
GetLengthSid
CopySid
GetSidSubAuthority
InitializeSid
shell32
ShellExecuteW
ShellExecuteA
SHGetSpecialFolderPathW
skinhu
SkinH_Attach
gdiplus
GdiplusShutdown
userenv
UnloadUserProfile
wininet
DeleteUrlCacheEntryW
urlmon
URLDownloadToFileW
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ