Static task
static1
Behavioral task
behavioral1
Sample
ae7dd5c145097d2da2e3eae6009d4881270ff580903ccf76a8ef52901514012f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae7dd5c145097d2da2e3eae6009d4881270ff580903ccf76a8ef52901514012f.exe
Resource
win10v2004-20220901-en
General
-
Target
ae7dd5c145097d2da2e3eae6009d4881270ff580903ccf76a8ef52901514012f
-
Size
871KB
-
MD5
b51f2f6c267f1d1e5790986edf5941d1
-
SHA1
18b2056f15da8287c37552796f25a84f60797f9d
-
SHA256
ae7dd5c145097d2da2e3eae6009d4881270ff580903ccf76a8ef52901514012f
-
SHA512
b8b04084f854b1a5b294aa59b61b409914cd56ca9fa4ebfc78302c820bf1b98718389ad87097a2f1827f77c894050787296175c13f537ec18273d02c164bdeb8
-
SSDEEP
24576:g8BnwvnMwncCpUbWQBzW73RmKHtFR4jdxNPKColyz:g8uLceKJWNmKt4jHwQ
Malware Config
Signatures
Files
-
ae7dd5c145097d2da2e3eae6009d4881270ff580903ccf76a8ef52901514012f.exe windows x86
9d9a1ec032b686d899a1cd0d91f91894
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
TlsGetValue
DeviceIoControl
GetDriveTypeA
GetModuleHandleA
HeapCreate
GetStartupInfoA
GetFileAttributesA
CreateFileA
PulseEvent
GetModuleFileNameW
lstrlenA
IsBadStringPtrA
SuspendThread
DeleteFileA
IsDebuggerPresent
TlsAlloc
Sleep
ReleaseMutex
GetACP
user32
FindWindowW
DestroyMenu
CallWindowProcW
DestroyWindow
IsZoomed
DispatchMessageA
LoadImageA
GetWindowLongA
IsWindow
PeekMessageA
DispatchMessageA
GetIconInfo
DrawTextW
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
cryptui
WizardFree
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ