Static task
static1
Behavioral task
behavioral1
Sample
aae7401b60d37577518da92e630579007ca1dd6127c3b28bfa2eedbbc694d150.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aae7401b60d37577518da92e630579007ca1dd6127c3b28bfa2eedbbc694d150.exe
Resource
win10v2004-20220901-en
General
-
Target
aae7401b60d37577518da92e630579007ca1dd6127c3b28bfa2eedbbc694d150
-
Size
178KB
-
MD5
06de12f3a8f162b63c72e6809fc03b67
-
SHA1
1a0235535a7c94543640b23b2e60799616045aa4
-
SHA256
aae7401b60d37577518da92e630579007ca1dd6127c3b28bfa2eedbbc694d150
-
SHA512
0f2be11b0ffdce0b4477f75c6b5bf415baf31b8a62094ea2783ad8301c75a33730632fb50eada00619d7701a1e1b3cdc5609ed5d427bfa7a44d69dd30745bb80
-
SSDEEP
3072:Eo4z7OfTBft2WLpfD28LSfvpZSdxu145vRmtzGqXgis9IVp:Eo4z7OfTBlrLpfDJUSOt1gTIV
Malware Config
Signatures
Files
-
aae7401b60d37577518da92e630579007ca1dd6127c3b28bfa2eedbbc694d150.exe windows x86
de119f3d842aa29f31b66128b7948fd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GlobalUnlock
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
GetCurrentThreadId
CopyFileA
WideCharToMultiByte
lstrcpyW
LocalReAlloc
LocalSize
MultiByteToWideChar
GetEnvironmentVariableA
WinExec
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateRemoteThread
GetModuleHandleA
OpenProcess
Module32Next
Module32First
GetDiskFreeSpaceExA
GetDriveTypeA
ReadFile
LocalAlloc
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
TerminateThread
lstrcpyA
GetWindowsDirectoryA
lstrcatA
GetStartupInfoA
CreateProcessA
GetFileAttributesA
GetLastError
MoveFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetProcAddress
FreeLibrary
CreateThread
ExitThread
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
LocalFree
CreateFileA
GetFileSize
SetFilePointer
WriteFile
lstrlenA
GetSystemDirectoryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
LoadLibraryA
GlobalMemoryStatusEx
user32
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindowVisible
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
GetWindowThreadProcessId
SendMessageA
LoadIconA
RegisterClassA
GetInputState
PostThreadMessageA
GetMessageA
GetCursorInfo
ReleaseDC
SetRect
GetSystemMetrics
CloseClipboard
OpenClipboard
wsprintfA
EmptyClipboard
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
IsWindow
GetWindowTextA
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
GetStockObject
CreateCompatibleDC
CreateDIBSection
SelectObject
DeleteObject
advapi32
StartServiceA
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
ControlService
QueryServiceStatus
AbortSystemShutdownA
GetUserNameA
LookupAccountSidA
GetTokenInformation
RegCreateKeyA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
_initterm
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_strcmpi
_strrev
_stricmp
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
??0exception@@QAE@ABQBD@Z
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
_onexit
__dllonexit
??1type_info@@UAE@XZ
_snprintf
_beginthreadex
_mbscmp
_mbsstr
atol
puts
wcscpy
_errno
strncmp
atoi
realloc
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memcpy
memmove
ceil
_ftol
strlen
strstr
memcmp
rand
strcpy
sprintf
strncpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
exit
strcat
strncat
ws2_32
WSACleanup
WSAStartup
ioctlsocket
__WSAFDIsSet
recvfrom
listen
getpeername
bind
ntohs
inet_ntoa
getsockname
gethostname
htonl
WSASocketA
sendto
inet_addr
send
closesocket
select
recv
socket
gethostbyname
WSAIoctl
setsockopt
connect
htons
accept
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
urlmon
URLDownloadToFileA
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICCompressorFree
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
netapi32
NetUserAdd
NetApiBufferFree
NetUserEnum
NetUserSetInfo
NetUserGetInfo
NetUserDel
NetLocalGroupAddMembers
psapi
EnumProcesses
GetModuleBaseNameA
EnumProcessModules
wtsapi32
WTSEnumerateSessionsA
WTSFreeMemory
WTSQuerySessionInformationA
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationW
Sections
.data Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ