Static task
static1
Behavioral task
behavioral1
Sample
aaf7f8b9aa74f707ed5bed1dd366ab0b1e5fc3b46162abb664899f1b0fe3e92f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaf7f8b9aa74f707ed5bed1dd366ab0b1e5fc3b46162abb664899f1b0fe3e92f.exe
Resource
win10v2004-20220901-en
General
-
Target
aaf7f8b9aa74f707ed5bed1dd366ab0b1e5fc3b46162abb664899f1b0fe3e92f
-
Size
463KB
-
MD5
ab6a04d65b779bdabf818e3692df8a3a
-
SHA1
afa551520f47ca50d111831931b36dde3c918a9f
-
SHA256
aaf7f8b9aa74f707ed5bed1dd366ab0b1e5fc3b46162abb664899f1b0fe3e92f
-
SHA512
60b5dba98ac6fbfcf00ff043f26f70d8d9b4576fa7bdace7908054acfffa178e1944856eabc15111a1e5388d15e9bd3825ed457a6bec0658cf5e732ba6b7597f
-
SSDEEP
12288:Kee/Gn8bEfotga0SsUIjZa2uXgoQ0FleZLEZNpBzmP0qvTTGRD:KeeOn8cVaIUIMQ0FAEZxzmP0qvXGRD
Malware Config
Signatures
Files
-
aaf7f8b9aa74f707ed5bed1dd366ab0b1e5fc3b46162abb664899f1b0fe3e92f.exe windows x86
3d59178a5ef5ca48d9b9a8ec63f52df1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
PostQuitMessage
IsWindow
DispatchMessageA
DispatchMessageW
GetClientRect
ClientToScreen
DestroyWindow
GetParent
DefWindowProcA
ShowWindow
SetWindowLongA
EnableWindow
InvalidateRect
SetWindowPos
TranslateMessage
GetWindow
LoadStringA
IsIconic
RegisterClassA
GetWindowLongA
SetTimer
ReleaseDC
EndPaint
SetFocus
BeginPaint
GetSystemMetrics
GetWindowRect
wsprintfA
PeekMessageA
FillRect
EndDialog
SetWindowTextA
GetSubMenu
CreateWindowExA
ScreenToClient
LoadCursorA
SendMessageA
GetDesktopWindow
MessageBoxA
GetSysColor
SystemParametersInfoA
EnableMenuItem
IsWindowVisible
GetDC
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
RegCloseKey
ole32
CoUninitialize
CoTaskMemAlloc
kernel32
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameW
lstrcmpiW
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleA
InterlockedDecrement
GetModuleFileNameA
SetLastError
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
GetFileAttributesA
FormatMessageA
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
WaitForSingleObject
CompareStringA
SetFileAttributesA
GetExitCodeProcess
LocalFree
ResetEvent
GetOEMCP
VirtualAlloc
Sleep
VirtualFree
FindResourceW
HeapCreate
IsValidCodePage
CreateProcessA
GetVersion
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
lstrlenW
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
LCMapStringW
GetLastError
LeaveCriticalSection
ExitProcess
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetProcAddress
WaitForMultipleObjects
DuplicateHandle
CreateThread
lstrcpyA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GlobalLock
DeleteFileW
GetStartupInfoW
GetEnvironmentVariableA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
SetEvent
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetCurrentThreadId
SetEndOfFile
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
MulDiv
SetUnhandledExceptionFilter
FormatMessageW
gdi32
GetDeviceCaps
DeleteObject
oleaut32
VariantInit
SysAllocString
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strcmpi
Sections
.text Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ