Static task
static1
Behavioral task
behavioral1
Sample
aceef14bb3b73391a5df1b8e40144bae5367fc3d516ab1784b5568362fbc892a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aceef14bb3b73391a5df1b8e40144bae5367fc3d516ab1784b5568362fbc892a.exe
Resource
win10v2004-20220812-en
General
-
Target
aceef14bb3b73391a5df1b8e40144bae5367fc3d516ab1784b5568362fbc892a
-
Size
173KB
-
MD5
2c70044bdf8cca2c30ed5ff8b2469d23
-
SHA1
d68c299b0ddb8d28279b8ee055fd17fe670a8bc8
-
SHA256
aceef14bb3b73391a5df1b8e40144bae5367fc3d516ab1784b5568362fbc892a
-
SHA512
a1ac90b8fc4d00f3231e14ecbca7604a50297e1c41fec4fa18212d9b6bdbe00301946c189fa4a26b3a831e303ca6f3f1ac25720b83d0b6e9d8acd4c9c84dbed3
-
SSDEEP
3072:n6TxMuCWNLS9yNy9wfaJCcmPPIwirciLaLru+n2wWnX:TFiLHMmgugw+ci2P1n2wE
Malware Config
Signatures
Files
-
aceef14bb3b73391a5df1b8e40144bae5367fc3d516ab1784b5568362fbc892a.exe windows x86
b61c54a04111bcaa55075620febb9e75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleUninitialize
OleInitialize
user32
RegisterClassExA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetClassInfoExA
FindWindowA
UnregisterClassA
RegisterWindowMessageA
SendMessageA
ReleaseDC
DestroyWindow
GetDC
GetSystemMetrics
CharNextA
msvcr71
strncpy
strrchr
??3@YAXPAX@Z
_putenv
?terminate@@YAXXZ
_controlfp
_onexit
memset
memmove
realloc
sprintf
_vsnprintf
??2@YAPAXI@Z
strstr
strtol
getenv
atoi
_mbctype
_stricmp
vsprintf
asctime
gmtime
time
__security_error_handler
printf
_CxxThrowException
_except_handler3
free
__dllonexit
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
wcslen
__CxxFrameHandler
_purecall
malloc
kernel32
IsBadWritePtr
GetCurrentDirectoryA
SetCurrentDirectoryA
SetFilePointer
FindResourceExA
FindResourceA
LoadResource
LockResource
SetUnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
MoveFileA
CreateDirectoryA
GetFileAttributesA
VirtualProtect
CreateFileA
DeleteFileA
LoadLibraryA
FreeLibrary
InterlockedDecrement
InterlockedIncrement
TerminateThread
CreateThread
GetCurrentThreadId
GetCurrentProcess
WriteFile
GetThreadContext
VirtualQuery
OpenProcess
GlobalMemoryStatus
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
IsBadReadPtr
SizeofResource
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
SetErrorMode
GetVersionExA
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateMutexA
WaitForSingleObject
CloseHandle
ReleaseMutex
GetCommandLineW
LocalFree
GetModuleHandleA
GetProcAddress
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
GetEnvironmentVariableA
GetModuleFileNameA
SetEnvironmentVariableA
shell32
CommandLineToArgvW
SHGetFolderPathA
advapi32
RegCloseKey
RegOpenKeyA
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathAddBackslashA
PathStripToRootA
PathAppendA
version
GetFileVersionInfoA
VerQueryValueA
gdi32
GetDeviceCaps
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE