Static task
static1
Behavioral task
behavioral1
Sample
aef03763d0e0c0bf33a1aa4f188b48cdd81bfb85a2d37a776be425e1327d3006.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aef03763d0e0c0bf33a1aa4f188b48cdd81bfb85a2d37a776be425e1327d3006.exe
Resource
win10v2004-20221111-en
General
-
Target
aef03763d0e0c0bf33a1aa4f188b48cdd81bfb85a2d37a776be425e1327d3006
-
Size
5.1MB
-
MD5
35abab024ca4a32290e9a8a5c10dcfac
-
SHA1
14527f44f92b97f0e81059512eca71a99654edcc
-
SHA256
aef03763d0e0c0bf33a1aa4f188b48cdd81bfb85a2d37a776be425e1327d3006
-
SHA512
e326c447a9c8cd34487feaac6500c2974975946ddd8bd649a6da884a0b0103ca8b0db709b83fefd253369008ca2fc34a82713b087ce51ad4f1618da6c390e6ec
-
SSDEEP
98304:CqYB2QxGBQb7hxtX2uGoprvuwXKjGTXgMrWQDty0umspxl5UeCMXmssG:CgFBkhxtGKprvrzrbty0qxl5Usvz
Malware Config
Signatures
Files
-
aef03763d0e0c0bf33a1aa4f188b48cdd81bfb85a2d37a776be425e1327d3006.exe windows x86
2c2beca6bc18cd83d7ec2aa5b936c1f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHGetPathFromIDListW
SHGetMalloc
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateFileW
ExpandEnvironmentStringsW
GetCommandLineW
DeleteFileW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
FindFirstFileW
FindClose
FindNextFileW
FormatMessageW
InterlockedExchangeAdd
SetEndOfFile
SetFileTime
WriteFile
SetFilePointer
GetFileSize
ReadFile
WideCharToMultiByte
GetACP
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetFileAttributesW
GetLongPathNameW
MoveFileW
lstrlenW
CreateEventW
SetEvent
ResetEvent
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
ResumeThread
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
IsValidCodePage
user32
CreateDialogParamW
SetTimer
LoadIconW
ScreenToClient
TranslateMessage
IsWindowVisible
GetMessageW
IsDialogMessageW
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetDlgItem
SendMessageW
EndDialog
SetFocus
GetWindowTextW
SetWindowTextW
PostQuitMessage
DispatchMessageW
GetActiveWindow
GetDesktopWindow
LoadStringW
KillTimer
EnableWindow
gdi32
CreateSolidBrush
DeleteObject
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ