Static task
static1
Behavioral task
behavioral1
Sample
a4ca0888eba871112d48bee5c3c1bab8a59ed0ae03b1a37ba7daa015f8749816.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4ca0888eba871112d48bee5c3c1bab8a59ed0ae03b1a37ba7daa015f8749816.exe
Resource
win10v2004-20221111-en
General
-
Target
a4ca0888eba871112d48bee5c3c1bab8a59ed0ae03b1a37ba7daa015f8749816
-
Size
739KB
-
MD5
5345b178e289de6ca033ff1c1874296e
-
SHA1
1c6b101d729f5ab79f9d7285093246dcf711f19d
-
SHA256
a4ca0888eba871112d48bee5c3c1bab8a59ed0ae03b1a37ba7daa015f8749816
-
SHA512
95d60e116dd8fed270d16b45a48078247b276e197a6f82e61cb0bdff70f69298f4943c0474a4d6c3601f1a07d1c5ba71993570a89af32c9111261a0c00fa9fa4
-
SSDEEP
12288:qWtJqoAeb3vtPKhBuTEecdmme3mvdsXQtgBO:qmAS3vp4Q93Svd6A/
Malware Config
Signatures
Files
-
a4ca0888eba871112d48bee5c3c1bab8a59ed0ae03b1a37ba7daa015f8749816.exe windows x86
9382ec11d25dd717897199106fcc6828
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsA
GetFileAttributesExW
GetFileAttributesW
CreateDirectoryW
UnhandledExceptionFilter
GetTickCount
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
GetCurrentDirectoryA
GetCurrentDirectoryW
GetEnvironmentVariableA
LoadLibraryW
FreeLibrary
MoveFileExW
GetFileSize
FlushFileBuffers
SetEndOfFile
CreateFileW
GetModuleHandleA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
DuplicateHandle
GetVersionExA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
VirtualAlloc
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
DebugBreak
OutputDebugStringA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateFileMappingA
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersionExW
GlobalAddAtomA
SetErrorMode
MulDiv
GlobalDeleteAtom
VirtualQuery
ReadFile
WriteFile
SetFilePointer
FindVolumeClose
CreateFileA
GetModuleFileNameA
CreatePipe
GetStartupInfoA
TerminateProcess
CreateProcessA
TlsFree
TlsAlloc
GetCurrentThreadId
Sleep
TerminateThread
TlsSetValue
GetSystemTimeAsFileTime
WaitForSingleObject
LocalFree
CloseHandle
CreateMutexA
LocalAlloc
GetCurrentThread
GetCurrentProcess
FindNextVolumeA
GetDiskFreeSpaceExA
FindFirstVolumeA
GetLastError
GetVolumeInformationA
GetDriveTypeA
IsDebuggerPresent
user32
GetWindowThreadProcessId
CreateCursor
DestroyCursor
LockWindowUpdate
GetDCEx
ToAsciiEx
MapVirtualKeyExW
VkKeyScanExW
GetDesktopWindow
IsIconic
IsZoomed
SetWindowLongW
GetSystemMenu
EnableMenuItem
SetWindowTextW
CreateIconIndirect
SetForegroundWindow
GetActiveWindow
DestroyIcon
CreateWindowExA
SetPropW
GetClipboardData
GetParent
SetActiveWindow
SetCapture
GetCapture
EnableWindow
ReleaseCapture
ShowWindow
ScrollWindowEx
SetWindowPos
GetCursorPos
SetClipboardData
GetClipboardOwner
SetWindowRgn
RemovePropW
DestroyWindow
SetParent
IsWindow
BeginPaint
EndPaint
SendMessageW
DefWindowProcW
SetRect
IsClipboardFormatAvailable
CountClipboardFormats
GetPropW
GetSysColor
SystemParametersInfoW
GetKeyboardLayout
GetKeyboardState
RegisterClipboardFormatA
MessageBeep
SetCursor
LoadCursorW
LoadImageW
LoadIconW
RegisterClassExW
MsgWaitForMultipleObjects
PostMessageW
ReleaseDC
InvalidateRect
GetDC
CloseClipboard
EnumClipboardFormats
EmptyClipboard
OpenClipboard
ClientToScreen
ScreenToClient
GetMessagePos
GetMessageTime
AdjustWindowRectEx
GetWindowLongW
RedrawWindow
DispatchMessageW
PeekMessageW
WindowFromPoint
MessageBoxA
gdi32
BitBlt
StretchBlt
SetTextColor
SetBkColor
SetBrushOrgEx
CreatePatternBrush
CreateSolidBrush
SetROP2
SelectClipRgn
GetPolyFillMode
GetBkColor
GetTextColor
GetStockObject
StrokePath
EndPath
Polyline
BeginPath
LineTo
MoveToEx
SetBkMode
RoundRect
Arc
Chord
Pie
Polygon
GetTextFaceA
GetTextMetricsW
CreateFontIndirectW
GetTextExtentPoint32W
CreateCompatibleBitmap
GetDIBits
SetDIBits
CreateDIBSection
CreatePalette
GetPaletteEntries
TextOutW
SetPixel
ExtCreatePen
CreateBrushIndirect
SetTextAlign
SetPolyFillMode
GetRgnBox
DeleteObject
GdiFlush
DeleteDC
GetDeviceCaps
CreateCompatibleDC
CreateBitmap
RealizePalette
SelectPalette
CombineRgn
CreateRectRgn
GetPixel
Rectangle
PatBlt
SelectObject
advapi32
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
GetLengthSid
IsValidSecurityDescriptor
FreeSid
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
ImpersonateSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
OpenProcessToken
shell32
SHGetFileInfoW
ShellExecuteA
msvcp90
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEABDI@Z
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?str@?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHPBDH@Z
?uncaught_exception@std@@YA_NXZ
??$?6DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
msvcr90
_close
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
__initenv
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_strdup
getenv
fflush
_CIcos
_CIsin
_CxxThrowException
setlocale
__CxxFrameHandler3
strtod
strtoul
strtol
_vsnprintf
memmove
memset
memcpy
_time64
_localtime64
exit
_write
_lseek
fprintf
fgets
strncpy
isprint
_errno
strchr
__iob_func
strerror
_fstat64i32
_strnicmp
_stricmp
memmove_s
_splitpath
_beginthreadex
_endthreadex
_purecall
putchar
realloc
printf
sprintf
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
free
?_open@@YAHPBDHH@Z
_access
_snprintf
_invalid_parameter_noinfo
_read
??3@YAXPAX@Z
malloc
??2@YAPAXI@Z
abort
perror
sscanf
strncmp
calloc
?_type_info_dtor_internal_method@type_info@@QAEXXZ
Sections
.text Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ