Static task
static1
Behavioral task
behavioral1
Sample
aee47d62a23c9771b752b125133753c73db7b2f53aa484a3c7a2afb6d5586fd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aee47d62a23c9771b752b125133753c73db7b2f53aa484a3c7a2afb6d5586fd9.exe
Resource
win10v2004-20220812-en
General
-
Target
aee47d62a23c9771b752b125133753c73db7b2f53aa484a3c7a2afb6d5586fd9
-
Size
640KB
-
MD5
63027cfe44fdc749bd965264836f7930
-
SHA1
77685c0b5b99a615825cffba34819d67874ae136
-
SHA256
aee47d62a23c9771b752b125133753c73db7b2f53aa484a3c7a2afb6d5586fd9
-
SHA512
3f8e437e18fd25e1967ae74a04540055bceebf7c7a7cbc6ff142efdb37951cf584e6554fb0ec3640bf7f1d2651447154ef54a8b9ac34e17e825c3ee37b1fba6e
-
SSDEEP
12288:A4GnWzkwmR7HLJlf6i0prF3XDhddWm44yYCuQ17od8nCB:A4GcmRDLKf5zWayNV18d8nCB
Malware Config
Signatures
Files
-
aee47d62a23c9771b752b125133753c73db7b2f53aa484a3c7a2afb6d5586fd9.exe windows x86
bfc8ab1d9844fdec44107b38359c850f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
GetStdHandle
GetLastError
GetProcAddress
LoadLibraryA
CreateFileMappingA
GetConsoleScreenBufferInfo
GetModuleHandleA
FillConsoleOutputAttribute
GetCurrentThreadId
OutputDebugStringA
CloseHandle
lstrcpyA
RtlUnwind
DecodePointer
CreateFileW
FlushFileBuffers
SetStdHandle
VirtualQuery
GetProcessHeap
LCMapStringW
HeapFree
HeapQueryInformation
GlobalUnlock
HeapReAlloc
GetConsoleMode
GetConsoleCP
SetFilePointer
FreeLibrary
LoadLibraryW
OutputDebugStringW
InterlockedDecrement
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
InitializeCriticalSectionAndSpinCount
SetLastError
TlsFree
SetConsoleCursorPosition
HeapCreate
ReadConsoleInputA
GlobalAlloc
FlushViewOfFile
FlushConsoleInputBuffer
WaitForSingleObject
GlobalLock
HeapSize
GetCurrentProcess
HeapAlloc
UnmapViewOfFile
MapViewOfFile
GetLocaleInfoA
lstrlenA
TlsSetValue
TlsGetValue
TlsAlloc
IsBadReadPtr
HeapValidate
GetStringTypeW
IsProcessorFeaturePresent
EncodePointer
WriteFile
RaiseException
GetModuleFileNameW
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
GetFileSize
CreateFileA
ExitProcess
WriteConsoleW
FillConsoleOutputCharacterA
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
LocalFree
TerminateProcess
user32
GetClassLongA
DispatchMessageW
DestroyWindow
CloseClipboard
GetSystemMenu
GetWindowRect
GetMessageW
SetForegroundWindow
IsClipboardFormatAvailable
AttachThreadInput
LoadCursorW
wsprintfA
GetClientRect
GetWindowTextLengthA
SendMessageA
TranslateMessage
GetForegroundWindow
LoadIconW
GetWindowTextA
SetWindowLongA
MessageBoxA
BringWindowToTop
GetWindowLongA
SystemParametersInfoW
CreateWindowExA
EnableMenuItem
SetClassLongA
ShowWindow
CreateWindowExW
DispatchMessageA
OpenClipboard
SystemParametersInfoA
RegisterClassW
SetWindowTextA
SendMessageW
UpdateWindow
SetClipboardData
GetWindowThreadProcessId
gdi32
CreateFontIndirectW
SetBrushOrgEx
CreateBitmap
DeleteObject
SelectObject
CreatePatternBrush
PatBlt
advapi32
AccessCheck
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
SHBrowseForFolderA
SHChangeNotify
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoTaskMemFree
CoCreateInstance
oleaut32
SysFreeString
VariantChangeType
VariantInit
VariantCopy
VariantClear
SysAllocString
shlwapi
StrChrA
comctl32
InitCommonControlsEx
traffic
TcEnumerateFlows
sensapi
IsNetworkAlive
Sections
.text Size: 247KB - Virtual size: 247KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ