Static task
static1
Behavioral task
behavioral1
Sample
aefe1146f66b46ea8ede7fe4387839cdf54009543f27b6c6a31ee7ddc72b9c39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aefe1146f66b46ea8ede7fe4387839cdf54009543f27b6c6a31ee7ddc72b9c39.exe
Resource
win10v2004-20220812-en
General
-
Target
aefe1146f66b46ea8ede7fe4387839cdf54009543f27b6c6a31ee7ddc72b9c39
-
Size
490KB
-
MD5
4d19a3449403bd7e65a5a3a05e111845
-
SHA1
1e74388925fd5564a73a108c8f00cd67b034164f
-
SHA256
aefe1146f66b46ea8ede7fe4387839cdf54009543f27b6c6a31ee7ddc72b9c39
-
SHA512
9437eddf3a423e14a78a3db65607376bed505061a54a7ae1f78ac85866be70fab3f80a95656e21cc4c71166c3543a022dea7edb5f8d850717d4bcb3e8d922b52
-
SSDEEP
12288:wddUuQEq/opdflWSZ1kuM+/La+EVAPxqXJ:4dUBvefLZmut/La+EqPx
Malware Config
Signatures
Files
-
aefe1146f66b46ea8ede7fe4387839cdf54009543f27b6c6a31ee7ddc72b9c39.exe windows x86
c31fa89adc38bb32867fc7a534ee1697
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeInitializeA
CascadeWindows
DlgDirListComboBoxA
RegisterWindowMessageA
GetClassInfoW
RegisterClassA
RegisterClassExA
BroadcastSystemMessageW
GetClassInfoExW
SendIMEMessageExA
GetDC
EnumWindows
CloseWindowStation
GetTitleBarInfo
LoadAcceleratorsA
GetMessagePos
EnumWindowStationsA
CopyAcceleratorTableW
SetDlgItemInt
EnableScrollBar
DefWindowProcA
DialogBoxParamW
comctl32
InitCommonControlsEx
kernel32
VirtualQuery
TlsFree
GetEnvironmentStrings
WideCharToMultiByte
OpenFileMappingA
GetCommandLineW
ReadFile
CreateRemoteThread
GetCurrentProcess
HeapCreate
SetHandleCount
RtlUnwind
FreeEnvironmentStringsA
InitializeCriticalSection
GetProcAddress
EnterCriticalSection
WriteFile
GetStartupInfoA
GetStringTypeA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
CloseHandle
SetEnvironmentVariableA
GlobalUnfix
GetFileType
GetSystemInfo
GetPrivateProfileIntW
GetModuleFileNameW
LoadLibraryA
GetLocaleInfoW
GetACP
LCMapStringW
GetTimeZoneInformation
TlsSetValue
GetCurrentProcessId
VirtualProtect
FreeEnvironmentStringsW
HeapFree
SetStdHandle
VirtualAlloc
CreateNamedPipeA
SetFilePointer
GetStartupInfoW
GetCurrentThread
SetLastError
GetCurrentThreadId
GetStdHandle
GetTimeFormatA
VirtualFreeEx
GetModuleFileNameA
VirtualFree
CompareStringA
LocalSize
IsBadWritePtr
GetTickCount
GetVolumeInformationA
GetCalendarInfoA
CreateMutexA
QueryPerformanceCounter
HeapSize
CreateFileMappingA
GetWindowsDirectoryW
ExitProcess
OpenMutexA
InterlockedExchange
UnhandledExceptionFilter
GetStringTypeExA
GetVersionExA
HeapReAlloc
DeleteCriticalSection
IsValidLocale
TlsGetValue
TlsAlloc
FlushFileBuffers
EnumSystemLocalesA
GetCommandLineA
GetStringTypeW
MultiByteToWideChar
GetCPInfo
HeapDestroy
GetDateFormatA
IsValidCodePage
CreateProcessA
HeapAlloc
GetLocaleInfoA
WaitCommEvent
FreeLibraryAndExitThread
GetCurrentDirectoryA
CompareStringW
GetOEMCP
LeaveCriticalSection
TerminateProcess
GetLastError
LCMapStringA
GetModuleHandleA
GetUserDefaultLCID
shell32
ExtractAssociatedIconW
DuplicateIcon
ShellExecuteEx
comdlg32
FindTextA
PrintDlgW
PageSetupDlgA
wininet
InternetCanonicalizeUrlW
GopherFindFirstFileW
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 311KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ