Static task
static1
Behavioral task
behavioral1
Sample
aa768f5cf90c469a6dab29565089a1ef45aae5cf4669e50835fa472f69a09afb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa768f5cf90c469a6dab29565089a1ef45aae5cf4669e50835fa472f69a09afb.exe
Resource
win10v2004-20221111-en
General
-
Target
aa768f5cf90c469a6dab29565089a1ef45aae5cf4669e50835fa472f69a09afb
-
Size
180KB
-
MD5
06fa8f5dfc67bf0f492c3423d918fec5
-
SHA1
aac7242112632d0f909f007148e6e18aaf2adbf5
-
SHA256
aa768f5cf90c469a6dab29565089a1ef45aae5cf4669e50835fa472f69a09afb
-
SHA512
2494fa5aef01aa4088393123429b06c2313ba9fda21b80e826830fdfc120776374b509f6651a1998747bbb9aa7ab896969fdbf480d437579e4f7232ec832a924
-
SSDEEP
3072:NYVPSCWCKoT2gNMLMME6eHEqPpvsTmQwUM7W7kAhhetQBJ:NYVPSbCPagmLVE6eHRxnHGzet6
Malware Config
Signatures
Files
-
aa768f5cf90c469a6dab29565089a1ef45aae5cf4669e50835fa472f69a09afb.exe windows x86
227974be97287d72a0c2564c9510f5b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetCrackUrlW
InternetConnectW
InternetOpenW
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestW
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
kernel32
GetTempFileNameW
WriteFile
CreateFileW
GetTempPathW
GetLastError
CloseHandle
LocalFree
ExitProcess
GetModuleFileNameW
GetModuleHandleW
OpenProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateThread
GetFullPathNameW
GetTickCount
GetFileAttributesW
ReadFile
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringA
FlushFileBuffers
SetStdHandle
LCMapStringW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
LoadLibraryA
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
SetEndOfFile
GetDriveTypeA
GetProcessHeap
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileSizeEx
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleHandleA
IsDebuggerPresent
GetSystemTimeAsFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
HeapFree
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
EnterCriticalSection
LeaveCriticalSection
GetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
user32
SendMessageW
MessageBoxW
CharToOemW
SendDlgItemMessageW
SetWindowTextW
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetTimer
GetWindowRect
SetForegroundWindow
DialogBoxParamW
GetDC
LoadImageW
GetDlgItem
EndDialog
GetDlgItemTextW
SetDlgItemTextW
MapWindowPoints
MoveWindow
ReleaseDC
gdi32
SelectObject
GetTextMetricsW
comdlg32
CommDlgExtendedError
GetOpenFileNameW
advapi32
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
CryptHashData
shell32
DragQueryFileW
DragFinish
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
CommandLineToArgvW
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ibhsubk Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE