Static task
static1
Behavioral task
behavioral1
Sample
9ae44d27ec6ef67deae8857734ccc909ff8a49ccab508f7ef888b04a8bb87f99.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ae44d27ec6ef67deae8857734ccc909ff8a49ccab508f7ef888b04a8bb87f99.exe
Resource
win10v2004-20220812-en
General
-
Target
9ae44d27ec6ef67deae8857734ccc909ff8a49ccab508f7ef888b04a8bb87f99
-
Size
146KB
-
MD5
70d9af4d0b779547290afe1e9faf7fe0
-
SHA1
51478482c8e201918ff2b0e82706b054edf89f45
-
SHA256
9ae44d27ec6ef67deae8857734ccc909ff8a49ccab508f7ef888b04a8bb87f99
-
SHA512
7e14ae86edc9576011ac3fd1614ba3858fed6b256cbfa96fabcc1152e23feb98028252dab864be0bbce6310306f452238a3880eb98024be8557103fe4e0505da
-
SSDEEP
3072:1/9yuuuuuuu0NxfN4X1yvnx9CfKtaMasOaHIQX7hMEP5k9r+v8qxRXsJ7bsQuRjx:V9GNqenx9Cf8OaoQ7SKvjhsJyRjvp
Malware Config
Signatures
Files
-
9ae44d27ec6ef67deae8857734ccc909ff8a49ccab508f7ef888b04a8bb87f99.exe windows x86
b0c8aebc9f8b94529703cc5d14a819bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetTickCount
MoveFileExW
CreateEventW
SetEvent
WaitForSingleObject
MultiByteToWideChar
TerminateThread
WaitForMultipleObjects
GetDiskFreeSpaceExW
SetFilePointer
WriteFile
ResetEvent
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CreateWaitableTimerW
SetWaitableTimer
InitializeCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
UnhandledExceptionFilter
GetCurrentProcess
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
GetModuleHandleW
GetProcAddress
CreateProcessW
VirtualAlloc
VirtualFree
DeleteFileW
CloseHandle
ReadFile
GetLastError
LoadLibraryW
CreateFileW
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
IsDebuggerPresent
user32
UnregisterClassA
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shlwapi
PathAppendW
PathRemoveFileSpecW
PathGetDriveNumberW
PathFileExistsW
StrToIntW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
msvcp80
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?assign@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@ABV12@@Z
?rfind@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
?assign@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
msvcr80
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??3@YAXPAX@Z
strlen
memcpy_s
_invalid_parameter_noinfo
memmove_s
memset
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_vscwprintf
wcscmp
vswprintf_s
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
wcsncpy
_wcslwr_s
wcslen
?what@exception@std@@UBEPBDXZ
??_V@YAXPAX@Z
wcschr
memcmp
malloc
free
_wcsnicmp
_beginthreadex
wcscpy_s
strcmp
strcpy
memcpy
wcsncat
_wtoi64
_snwprintf
_CxxThrowException
__CxxFrameHandler3
_wcsicmp
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
wininet
HttpQueryInfoW
InternetConnectW
InternetOpenW
InternetReadFileExA
HttpEndRequestW
HttpSendRequestExW
HttpOpenRequestW
InternetCloseHandle
InternetCrackUrlW
InternetSetOptionW
InternetQueryOptionW
InternetSetStatusCallbackW
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE