Static task
static1
Behavioral task
behavioral1
Sample
aeee2f8bb9fb9ee8eb321897f3b88dd4058220229439a42d1c4e81f18fe1fb06.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aeee2f8bb9fb9ee8eb321897f3b88dd4058220229439a42d1c4e81f18fe1fb06.exe
Resource
win10v2004-20221111-en
General
-
Target
aeee2f8bb9fb9ee8eb321897f3b88dd4058220229439a42d1c4e81f18fe1fb06
-
Size
243KB
-
MD5
65433c71474b0a831e362c2b301e6209
-
SHA1
ebec1afbd354ffeb9a60ebfaa4831bb45db7803f
-
SHA256
aeee2f8bb9fb9ee8eb321897f3b88dd4058220229439a42d1c4e81f18fe1fb06
-
SHA512
f1900ea7f57b46eceba7f10aa5901d1c1ab8c964007810b552e35798837d267afff3b3466642f1955e9358d4ebc5d5bfe3a4800bb75b879535631a32837fa4f2
-
SSDEEP
6144:lin+DskApPicO5MJmjLWD/cyhZ4eU82wn:lin+Dtw6cOem8hHU82O
Malware Config
Signatures
Files
-
aeee2f8bb9fb9ee8eb321897f3b88dd4058220229439a42d1c4e81f18fe1fb06.exe windows x86
096b085d1d9d59c40b0baef8d1e94bfc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CloseServiceHandle
StartServiceW
ControlService
QueryServiceStatus
OpenServiceW
CreateServiceW
OpenSCManagerW
DeleteService
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CreateProcessAsUserW
AdjustTokenPrivileges
SetTokenInformation
DuplicateTokenEx
LookupPrivilegeValueW
OpenProcessToken
kernel32
GetLocalTime
lstrcpyW
SetFileAttributesW
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
lstrcatW
GetSystemDirectoryW
CopyFileW
GetProcAddress
LoadLibraryW
GetModuleFileNameW
lstrlenA
WriteFile
ReadFile
GetFileSize
CreateFileW
GetTempFileNameW
GetTempPathW
lstrcmpiW
lstrlenW
GetComputerNameW
MultiByteToWideChar
GetACP
GetDriveTypeW
Sleep
RemoveDirectoryW
GetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
FreeLibrary
LockResource
LoadResource
FindResourceW
EndUpdateResourceW
UpdateResourceW
SizeofResource
GetLastError
BeginUpdateResourceW
SystemTimeToFileTime
GetFileTime
lstrcpynW
GetWindowsDirectoryW
CreateDirectoryW
DeviceIoControl
GetDiskFreeSpaceW
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
WideCharToMultiByte
GetVersionExW
lstrcmpW
TerminateThread
SetEvent
FindNextChangeNotification
FindCloseChangeNotification
WaitForMultipleObjects
FindFirstChangeNotificationW
GetCommandLineW
GetCurrentThreadId
CreateThread
CreateEventW
GetStartupInfoW
GetVersionExA
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetFilePointer
LoadLibraryA
SetStdHandle
FlushFileBuffers
RtlUnwind
SetEndOfFile
GetProcessHeap
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CompareStringA
GetCPInfo
CompareStringW
GetOEMCP
SetEnvironmentVariableA
GetLocaleInfoA
user32
ShowWindow
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
GetForegroundWindow
PostThreadMessageW
GetInputState
RegisterClassExW
LoadCursorW
SendMessageW
FindWindowExW
GetClassNameW
PostQuitMessage
LookupIconIdFromDirectoryEx
DefWindowProcW
GetSystemMetrics
shlwapi
PathFileExistsW
shell32
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ