Static task
static1
Behavioral task
behavioral1
Sample
aa61883f39bd3002eecd1810fc5224960c576da2a9d8b3201a574dee6af2133f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa61883f39bd3002eecd1810fc5224960c576da2a9d8b3201a574dee6af2133f.exe
Resource
win10v2004-20220901-en
General
-
Target
aa61883f39bd3002eecd1810fc5224960c576da2a9d8b3201a574dee6af2133f
-
Size
269KB
-
MD5
4aa8254b3005016a96f6ed9657ad8600
-
SHA1
5f8eae9743ee58811cd19ef737cc859c79e828c3
-
SHA256
aa61883f39bd3002eecd1810fc5224960c576da2a9d8b3201a574dee6af2133f
-
SHA512
273c857b6d650d1031bf90e218717dba6f583d67ddc4e1c5bc8f7844b107b3f8d715f2955ad80794ac98c6e5d1308b9466139bf9f12787ebe0a26e5de13d63df
-
SSDEEP
6144:vBe3vwDj2DIU+Wn0ksdHCnrr/Wy8vmemYTzxo7i:pefwc+gDnrQmemYTdz
Malware Config
Signatures
Files
-
aa61883f39bd3002eecd1810fc5224960c576da2a9d8b3201a574dee6af2133f.exe windows x86
e1d03256386b0105ba9536d8b6a72309
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextW
GetSysColor
GetWindowLongW
GetClassInfoW
ExitWindowsEx
EnableMenuItem
SetCaretBlinkTime
GetWindow
GetKeyboardLayoutList
MessageBeep
SetRect
DrawFrameControl
KillTimer
ReplyMessage
ImpersonateDdeClientWindow
InsertMenuW
AnyPopup
ScreenToClient
GetMessagePos
CallWindowProcW
IsWindowVisible
LoadBitmapW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuW
CreatePopupMenu
GetSystemMetrics
EndDialog
FindWindowExW
GetSystemMenu
SetClassLongW
IsWindowEnabled
SetWindowPos
DialogBoxParamW
CheckDlgButton
CreateWindowExW
SystemParametersInfoW
RegisterClassW
SetDlgItemTextW
GetDlgItemTextW
MessageBoxIndirectW
CharNextA
CharUpperW
CharPrevW
DispatchMessageW
PeekMessageW
wsprintfA
DestroyWindow
CreateDialogParamW
SetTimer
SetWindowTextW
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfW
SendMessageTimeoutW
LoadCursorW
SetCursor
shell32
ShellExecuteA
dbghelp
SymGetLineFromName
SymGetLineNext
SymUnDName64
SymUnDName
DbgHelpCreateUserDump
kernel32
GetProcAddress
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
IsProcessorFeaturePresent
HeapReAlloc
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetTimeZoneInformation
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
DecodePointer
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
HeapAlloc
HeapCreate
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
HeapFree
GlobalWire
PrepareTape
EnumResourceLanguagesA
LCMapStringW
DeleteVolumeMountPointA
SetFileTime
CompareFileTime
SearchPathW
lstrcpynA
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
SetFilePointer
MultiByteToWideChar
ReadFile
WriteFile
lstrlenA
MulDiv
WideCharToMultiByte
GetPrivateProfileStringW
WritePrivateProfileStringW
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GlobalFree
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
ExpandEnvironmentStringsW
lstrcmpW
lstrcmpiW
RemoveDirectoryW
lstrcpyA
GetVersion
GetSystemDirectoryW
GetVersionExW
lstrcpyW
OpenProcess
GetModuleHandleA
LoadLibraryA
lstrcatW
GetTempFileNameW
lstrcmpiA
CreateProcessW
LoadLibraryW
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceW
lstrcpynW
lstrlenW
CloseHandle
SetErrorMode
GetCommandLineW
GetTempPathW
GetWindowsDirectoryW
ExitProcess
CopyFileW
GetCurrentProcess
GetModuleFileNameW
GetFileSize
CreateFileW
GetTickCount
Sleep
SetFileAttributesW
CreateDirectoryW
GetLastError
GetFileAttributesW
SetCurrentDirectoryW
MoveFileW
GetFullPathNameW
GetShortPathNameW
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BSS Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ