Static task
static1
Behavioral task
behavioral1
Sample
aebee296bcdbdf3b6c8995a8b82dd565dd1c41ab1c3ad59000c2cc45b459464e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aebee296bcdbdf3b6c8995a8b82dd565dd1c41ab1c3ad59000c2cc45b459464e.exe
Resource
win10v2004-20221111-en
General
-
Target
aebee296bcdbdf3b6c8995a8b82dd565dd1c41ab1c3ad59000c2cc45b459464e
-
Size
304KB
-
MD5
ac5de278fcd4e73ecbc7f2693e7f2f36
-
SHA1
5eb0b5a22bbf0d8a26de15c7833b6f3627d9a1a0
-
SHA256
aebee296bcdbdf3b6c8995a8b82dd565dd1c41ab1c3ad59000c2cc45b459464e
-
SHA512
31a4165c59b0224c186d72e925f7e42d8eb4127e50c15e51cecc70d08c88079fb40f5c159479c50695f1fe125f0e3bad381544b38a3329c59294aaa00d972482
-
SSDEEP
6144:3y5WuXhvYUFOtlyI6OBj2E+wFbmmlJ60x/QPZv:3y5WQfFOtlhJj2Elo05Qx
Malware Config
Signatures
Files
-
aebee296bcdbdf3b6c8995a8b82dd565dd1c41ab1c3ad59000c2cc45b459464e.exe windows x86
7b73c1d10c654253ef57489a127d9e60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetEndOfFile
SetStdHandle
SetFilePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
LCMapStringW
CreateFileA
LoadLibraryW
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
MultiByteToWideChar
IsValidCodePage
GetCPInfo
GetOEMCP
LocalFree
CloseHandle
CreateFileW
GetLastError
GetFileAttributesW
HeapCreate
GlobalAlloc
GetProcessHeap
GetCurrentProcess
IsProcessorFeaturePresent
HeapAlloc
GetACP
HeapFree
HeapQueryInformation
HeapSize
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
RtlUnwind
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
WriteFile
HeapReAlloc
user32
GetMessageA
GetWindowRect
IsIconic
GetFocus
SetFocus
SendMessageA
GetDC
TranslateMessage
SetCursorPos
GetClientRect
PeekMessageA
GetDlgItem
ScrollWindow
GetCursorPos
ShowWindow
WindowFromDC
IsWindow
DispatchMessageA
CloseWindow
FindWindowA
LoadCursorA
GetScrollPos
RegisterClassA
GetWindowLongA
gdi32
DeleteObject
SelectObject
CreateCompatibleDC
BitBlt
advapi32
RegOpenKeyExW
GetTokenInformation
OpenProcessToken
CheckTokenMembership
shell32
DragQueryFileA
oleaut32
GetErrorInfo
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ