Static task
static1
Behavioral task
behavioral1
Sample
ae5936350229668cde07177a8994a0a3082bfeea6d20aa01da447e241a00f88e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae5936350229668cde07177a8994a0a3082bfeea6d20aa01da447e241a00f88e.exe
Resource
win10v2004-20220901-en
General
-
Target
ae5936350229668cde07177a8994a0a3082bfeea6d20aa01da447e241a00f88e
-
Size
64KB
-
MD5
067c7732440b88b3927f5a1cc2feca41
-
SHA1
7576cb8202c5b25838c18b9825aff04fb7e10284
-
SHA256
ae5936350229668cde07177a8994a0a3082bfeea6d20aa01da447e241a00f88e
-
SHA512
d71531018519a845b851f8b4c902c46e56c230699674821274def87635448e7da3254b4d5f3699dd826fecb812beb54defc334edefbede12285c89a5bd4aaa97
-
SSDEEP
1536:hZRzyAqWS8vEi8jMSRrPCh4YWDQ3tnwesMyy:hZq83VyUtnwdp
Malware Config
Signatures
Files
-
ae5936350229668cde07177a8994a0a3082bfeea6d20aa01da447e241a00f88e.exe windows x86
a7d7695539886d1caed494886bc4a7ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GetFileSize
ReadProcessMemory
GetVersion
GetCommandLineA
GetLastError
OpenProcess
GetProcAddress
LoadLibraryA
GetCurrentProcess
FindNextFileA
FindFirstFileA
WinExec
TerminateProcess
Sleep
GetSystemDirectoryA
GetCurrentProcessId
GetPrivateProfileIntA
lstrcmpiA
MultiByteToWideChar
SetThreadPriority
GetCurrentThread
ReadFile
GetLocalTime
DeleteFileA
GetTempPathA
CreateProcessW
GetStartupInfoW
GetPrivateProfileIntW
GetPrivateProfileStringW
lstrcatW
OutputDebugStringA
CreateThread
QueryDosDeviceA
GetLogicalDriveStringsA
GetShortPathNameA
Module32First
TerminateThread
lstrlenA
GetModuleHandleA
WriteFile
GlobalFree
GetComputerNameA
GetVersionExA
CloseHandle
LocalFree
WideCharToMultiByte
CreateFileA
GetVolumeInformationA
user32
IsWindow
SendMessageA
ShowCursor
wsprintfA
MessageBoxA
GetWindowTextA
GetDesktopWindow
GetWindow
PostMessageA
FindWindowExA
FindWindowA
msvcrt
malloc
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_except_handler3
_rotl
strstr
strtok
memcmp
strrchr
strchr
printf
strcmp
__mb_cur_max
rename
_mbscmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
mbstowcs
free
strcat
_snprintf
fopen
fread
fclose
_mbsstr
_mbslwr
_mbsnbcpy
memset
_strcmpi
strlen
sprintf
tolower
_wcsupr
wcslen
_CxxThrowException
??1type_info@@UAE@XZ
strcpy
mfc42
ord815
ord2915
ord800
ord537
ord2107
ord2044
ord2448
ord2841
ord6394
ord5834
ord5450
ord540
ord858
ord3663
ord1575
ord561
advapi32
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetNamedSecurityInfoA
shell32
SHGetSpecialFolderPathW
SHChangeNotify
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleRun
oleaut32
VariantInit
VariantCopy
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
msvcp60
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
psapi
GetProcessImageFileNameA
EnumProcesses
shlwapi
SHGetValueA
PathRemoveFileSpecA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ