Static task
static1
Behavioral task
behavioral1
Sample
a7259fd3aea790bd5ab652389c05b51f0f3bac4fbb19a0864e534f9fa25cfc35.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a7259fd3aea790bd5ab652389c05b51f0f3bac4fbb19a0864e534f9fa25cfc35.exe
Resource
win10v2004-20230220-en
General
-
Target
a7259fd3aea790bd5ab652389c05b51f0f3bac4fbb19a0864e534f9fa25cfc35
-
Size
1.1MB
-
MD5
aeadfb929b40789383c9eb7c01efb285
-
SHA1
3d5014c386377c97bcde88d2ead37467c0693246
-
SHA256
a7259fd3aea790bd5ab652389c05b51f0f3bac4fbb19a0864e534f9fa25cfc35
-
SHA512
eeb563e1b2245e670e3774f782fdc2e389395f7be55a63ae93a7d33e016b49d887cbedcc412082eee8962f616c378fae1dbad92447fc043526c20de2c285906c
-
SSDEEP
24576:OCDXSfvEHi+ASh3pJliNp6Cj7Syyp8bQtOhO+6bNb7pyeECVzvCNS/2:pGvEL7mNJvSyyp80yV6bNb7Uy7CNj
Malware Config
Signatures
Files
-
a7259fd3aea790bd5ab652389c05b51f0f3bac4fbb19a0864e534f9fa25cfc35.exe windows x86
981a275bce22f656f306ebaaaa886c29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
lstrcmpW
MulDiv
SetFilePointerEx
GetFileSizeEx
SetFileAttributesW
DeleteFileW
SetFileTime
SetEndOfFile
WriteFile
GetVersion
lstrlenW
GetFullPathNameW
lstrcatW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventW
SetEvent
ResetEvent
lstrcpyW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateHardLinkW
RemoveDirectoryW
CreateSymbolicLinkW
VirtualAlloc
VirtualFree
GetModuleFileNameW
GetFileAttributesW
GetCurrentThread
FileTimeToSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
Sleep
IsNormalizedString
NormalizeString
GlobalMemoryStatusEx
CompareStringW
CreateFileA
GetDriveTypeW
FlushFileBuffers
GetTickCount
FindClose
GlobalFree
LocalFree
WideCharToMultiByte
GetModuleHandleW
lstrcmpiW
RaiseException
InitializeCriticalSectionEx
SetLastError
GetCurrentThreadId
GetUserDefaultLangID
DecodePointer
GetConsoleOutputCP
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
SetStdHandle
GetConsoleMode
LCMapStringW
GetStdHandle
GetCommandLineW
GetCommandLineA
ExitProcess
GetFileType
GetModuleHandleExW
FreeLibraryAndExitThread
WriteConsoleW
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
IsProcessorFeaturePresent
GetLastError
GetProcAddress
CloseHandle
CreateFileW
lstrcpynW
ReadFile
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetSystemDirectoryW
FreeLibrary
LoadLibraryExW
LoadLibraryW
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
IsDebuggerPresent
user32
GetDlgItem
CreateWindowExW
GetWindowRect
SendMessageW
SystemParametersInfoW
ScreenToClient
SetFocus
EndDialog
KillTimer
EnableWindow
SetTimer
SetDlgItemTextW
PostMessageW
MessageBoxW
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetClientRect
LoadIconW
GetWindowTextW
DialogBoxParamW
UnregisterClassW
GetActiveWindow
CharNextW
PeekMessageW
DispatchMessageW
TranslateMessage
RegisterWindowMessageW
MoveWindow
EnumChildWindows
SetWindowLongW
GetWindowLongW
FindWindowExW
GetClassNameW
MapWindowPoints
GetDlgCtrlID
GetParent
SetWindowPos
MonitorFromPoint
SetProcessDPIAware
ReleaseDC
GetDC
SetWindowTextW
InvalidateRect
GetWindowTextLengthW
gdi32
GetDeviceCaps
CreateFontIndirectW
GetObjectW
GetStockObject
DeleteObject
CreateFontW
advapi32
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
AreAllAccessesGranted
AccessCheck
OpenThreadToken
RevertToSelf
ImpersonateSelf
GetFileSecurityW
shell32
SHBrowseForFolderW
CommandLineToArgvW
SHGetPathFromIDListW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
PathIsDirectoryW
PathCanonicalizeW
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ