Static task
static1
Behavioral task
behavioral1
Sample
ae2768d3028d5e209ada1c5de5a45e49a653d6f00775603539b2669d1b56ec9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae2768d3028d5e209ada1c5de5a45e49a653d6f00775603539b2669d1b56ec9e.exe
Resource
win10v2004-20221111-en
General
-
Target
ae2768d3028d5e209ada1c5de5a45e49a653d6f00775603539b2669d1b56ec9e
-
Size
153KB
-
MD5
5e803c8c82b83b571fbc35fbdbc6fce2
-
SHA1
5270c9293c60fadfec3b083ea82629fca5d6fc64
-
SHA256
ae2768d3028d5e209ada1c5de5a45e49a653d6f00775603539b2669d1b56ec9e
-
SHA512
f265489b4b4ac787e8f97c709ce74ceeef58f09e2741327f0fbe1853c50ce65747a5d590e90b10dbf86fc1d84643cd5ff81a20c96cdcbff1c2dcaa84a8123d8a
-
SSDEEP
3072:3jhbgPIbFfcrFFedIfTi/ouEE8yob4ZpI8j2rwvDdhRVaGdqzaObrFc7o:3jhbgPIbFfcrFF7Ti/ouE3Mc8jt7p8Jv
Malware Config
Signatures
Files
-
ae2768d3028d5e209ada1c5de5a45e49a653d6f00775603539b2669d1b56ec9e.exe windows x86
ac0b4c0ca94e5adee7b3faf6988de759
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
Sleep
lstrlenA
GetModuleHandleA
GetStartupInfoA
user32
SetTimer
PostQuitMessage
EndPaint
BeginPaint
GetDlgItemTextA
DestroyWindow
ReleaseDC
GetDC
LoadBitmapA
GetClientRect
wsprintfA
FillRect
MessageBoxA
LoadCursorA
DefWindowProcA
LoadIconA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
gdi32
CreateCompatibleBitmap
CreateSolidBrush
SetBkMode
SetTextColor
TextOutA
BitBlt
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
ole32
CoInitialize
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??0Init@ios_base@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
msvcrt
memcpy
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
free
_EH_prolog
__CxxFrameHandler
strcmp
memmove
malloc
sprintf
getenv
strcat
strcpy
rand
_except_handler3
_stricmp
memset
strlen
??2@YAPAXI@Z
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ