Static task
static1
Behavioral task
behavioral1
Sample
ae1cf0bc4a5164078427b959119e1b2bb81b53f28dc060303b1b77e25fb9fee1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae1cf0bc4a5164078427b959119e1b2bb81b53f28dc060303b1b77e25fb9fee1.exe
Resource
win10v2004-20220901-en
General
-
Target
ae1cf0bc4a5164078427b959119e1b2bb81b53f28dc060303b1b77e25fb9fee1
-
Size
111KB
-
MD5
7b841f90b7b4d8dbe0563181e2c28ed3
-
SHA1
b1dbe482558ea67d3f0a83238809df0376e9a352
-
SHA256
ae1cf0bc4a5164078427b959119e1b2bb81b53f28dc060303b1b77e25fb9fee1
-
SHA512
cd8b7800689f7601266b431febe6e1cd4c5e46f0e6cbc7a453d544a8c2a4ad2c12996e20cede2e4b459c54d8f1eea4c463dba8582bac0a78f66f672e95948123
-
SSDEEP
3072:AXb0aVItLVzmEgi4wqgsT+iujXPXJ+Vx:ALQhzm02gsJqf5+
Malware Config
Signatures
Files
-
ae1cf0bc4a5164078427b959119e1b2bb81b53f28dc060303b1b77e25fb9fee1.exe windows x86
0b870d8008a33f2d2d346d8946e7d6e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
Sleep
GetConsoleMode
GetSystemTimeAsFileTime
LoadResource
SetFileTime
GetModuleHandleW
FreeEnvironmentStringsA
GetOEMCP
MultiByteToWideChar
DeleteFileA
GetWindowsDirectoryA
SetEnvironmentVariableA
SystemTimeToFileTime
lstrcmpA
GetThreadLocale
RtlUnwind
GetCurrentProcess
VirtualProtect
GetCurrentThreadId
GetUserDefaultLangID
GlobalHandle
GetPrivateProfileStringA
GetSystemTime
GetEnvironmentVariableA
GetStartupInfoA
IsDebuggerPresent
GetStartupInfoW
GetVersionExW
GetTempPathA
InterlockedExchange
DeleteFileW
GetExitCodeProcess
GetEnvironmentStringsW
GetSystemDirectoryW
GetTempPathW
GetStringTypeExA
GetEnvironmentStrings
UnhandledExceptionFilter
CopyFileW
CreateProcessA
lstrcmpiW
SetErrorMode
GetStringTypeA
OutputDebugStringA
LCMapStringW
EnumCalendarInfoA
IsBadWritePtr
GetModuleHandleA
MoveFileA
SetFileAttributesW
GetFileAttributesA
GetACP
msvcrt
__set_app_type
__p__commode
_except_handler3
_adjust_fdiv
_controlfp
__p__fmode
__p___initenv
_exit
_XcptFilter
__getmainargs
_initterm
__setusermatherr
advapi32
FreeSid
RegOpenKeyExW
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyA
CryptAcquireContextA
RegOpenKeyExA
RegCreateKeyExW
RegEnumValueW
GetUserNameA
ControlService
DeleteService
EqualSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CloseServiceHandle
RegQueryInfoKeyW
CryptReleaseContext
RegSetValueExW
SetSecurityDescriptorOwner
DeregisterEventSource
RegCloseKey
IsValidSid
InitializeAcl
LookupPrivilegeValueA
RegEnumValueA
GetTokenInformation
RegEnumKeyA
SetSecurityDescriptorGroup
RegEnumKeyExW
RegOpenKeyW
CryptCreateHash
CryptHashData
RegOpenKeyA
OpenThreadToken
user32
EnumThreadWindows
GetWindowThreadProcessId
LoadIconA
GetKeyState
SetCursor
MapWindowPoints
KillTimer
GetMenu
BeginPaint
DispatchMessageA
PtInRect
CloseClipboard
GetScrollRange
UnregisterClassA
ClientToScreen
SetActiveWindow
RegisterClipboardFormatA
GetSystemMenu
SetScrollRange
DrawIconEx
LoadCursorA
DeleteMenu
OffsetRect
CallWindowProcA
GetKeyboardType
EnableWindow
GetWindowLongA
GetIconInfo
EnableMenuItem
FrameRect
IsChild
SendDlgItemMessageA
DialogBoxParamA
GetDesktopWindow
DrawFrameControl
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ