Static task
static1
Behavioral task
behavioral1
Sample
ae5542b5d7538642fdf44bcc1bebc8239cb9ac4b275f714bd3d84d92f331f76a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae5542b5d7538642fdf44bcc1bebc8239cb9ac4b275f714bd3d84d92f331f76a.exe
Resource
win10v2004-20220812-en
General
-
Target
ae5542b5d7538642fdf44bcc1bebc8239cb9ac4b275f714bd3d84d92f331f76a
-
Size
50KB
-
MD5
c77044ca7f368e051ca5bda7f6cccf24
-
SHA1
b6308afd2806a85630a995713fe4a72a2f702b87
-
SHA256
ae5542b5d7538642fdf44bcc1bebc8239cb9ac4b275f714bd3d84d92f331f76a
-
SHA512
46f1ea5035a5706fc5cdef3f1e2d78eeffcab22c0168b270b9cb098e55e960c4c21fd8ffec580784c1c8dc534e573a4781d27c289bb91b4af5c603eba51791d7
-
SSDEEP
1536:2I+GEFuH6Kby8L9dO36NZKOoJ5iJBgMR1:FsFu9byO7B0OhJB7R
Malware Config
Signatures
Files
-
ae5542b5d7538642fdf44bcc1bebc8239cb9ac4b275f714bd3d84d92f331f76a.exe windows x86
d8b1ac273c92052775cb5b9d06bbcd77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_itoa
atol
rand
__dllonexit
_purecall
_ultoa
vsprintf
_onexit
exit
_beep
_makepath
strtok
_splitpath
malloc
sprintf
_snprintf
wcslen
fprintf
_ftol
time
vprintf
_stricmp
swprintf
strpbrk
_ltoa
_strupr
memmove
_chdir
printf
isprint
_beginthread
_strnicmp
strncpy
toupper
strtoul
fclose
_vsnprintf
fflush
fopen
_fullpath
_iob
winmm
auxSetVolume
advapi32
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
SetSecurityDescriptorDacl
RegisterEventSourceA
ReportEventA
InitializeSecurityDescriptor
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
DeregisterEventSource
kernel32
MapViewOfFile
SetThreadPriority
HeapDestroy
Sleep
GetLocalTime
SleepEx
CloseHandle
GetCurrentThread
CreateMutexA
TlsAlloc
GetProcAddress
ReleaseSemaphore
CreateEventA
CreateFileA
ReadProcessMemory
GetFileAttributesA
GetCurrentProcess
CreateThread
InitializeCriticalSection
TlsSetValue
CreateDirectoryA
FindClose
ReadFile
IsProcessorFeaturePresent
GetExitCodeThread
FindNextFileA
WaitForMultipleObjectsEx
FreeLibrary
GetUserDefaultLangID
GetModuleHandleA
WaitForSingleObjectEx
UnhandledExceptionFilter
GetCurrentThreadId
ReleaseMutex
SetFilePointer
VirtualAlloc
ResetEvent
QueryPerformanceCounter
WriteFileEx
DebugBreak
GlobalFree
GetCurrentProcessId
RemoveDirectoryA
WriteFile
lstrcmpA
HeapAlloc
GetDriveTypeA
CopyFileA
lstrlenA
SetEvent
OutputDebugStringA
GetModuleFileNameA
DeleteFileA
LeaveCriticalSection
DeleteCriticalSection
LCMapStringW
ExpandEnvironmentStringsA
CreateSemaphoreA
GetTickCount
VirtualFree
FindFirstFileA
MoveFileA
InterlockedIncrement
IsValidLocale
QueryPerformanceFrequency
GetSystemDefaultLangID
LoadLibraryA
TerminateProcess
HeapFree
lstrcpyA
GetLastError
GetFileSize
WaitForSingleObject
EnterCriticalSection
VirtualQuery
GetSystemInfo
ReadFileEx
GetDiskFreeSpaceA
GetOverlappedResult
GetVersionExA
GetProcessHeap
FlushFileBuffers
SetEndOfFile
HeapCreate
UnmapViewOfFile
GlobalMemoryStatus
CreateFileMappingA
TlsFree
TlsGetValue
GlobalAlloc
Sections
.textbss Size: 43KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE