Static task
static1
Behavioral task
behavioral1
Sample
aeed369d94a9e01850d81a845cf09207127cc1c1033167711621165e325eb50c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aeed369d94a9e01850d81a845cf09207127cc1c1033167711621165e325eb50c.exe
Resource
win10v2004-20220901-en
General
-
Target
aeed369d94a9e01850d81a845cf09207127cc1c1033167711621165e325eb50c
-
Size
291KB
-
MD5
9ebb18bf48a9df7a4aa33d80ab7087f8
-
SHA1
507c6751ff78ab5202ecabe40c6baf0d6969374d
-
SHA256
aeed369d94a9e01850d81a845cf09207127cc1c1033167711621165e325eb50c
-
SHA512
a76b71f8f9658dac93cef80d6a63725e573a5cf5635e8b10658b17cfc097b340dd157aa86ef29224ad967f4983bd8838d3f3d7f73a73783f1715196bcae9cdd1
-
SSDEEP
6144:BDMyKuUZb26fiBvnD4TONucQCoAndb+fZBvAf6yu:BDMyKvb26fI4aNuJCoEb+fr
Malware Config
Signatures
Files
-
aeed369d94a9e01850d81a845cf09207127cc1c1033167711621165e325eb50c.exe windows x86
ed88141319f3ee98c5a779feab01f246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetComputerNameW
lstrcpyW
GetModuleHandleA
CopyFileW
GetModuleHandleW
DelayLoadFailureHook
RemoveDirectoryW
lstrcpynW
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetWindowsDirectoryW
SetLastError
LocalFree
SetFileAttributesW
GetFileAttributesW
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
GetTempPathW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
FindClose
FindNextFileW
MoveFileW
FindFirstFileW
LoadLibraryExW
GetStartupInfoW
Sleep
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
HeapFree
lstrlenW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileW
SetFilePointer
WideCharToMultiByte
OutputDebugStringW
HeapAlloc
GetProcessHeap
advapi32
RegSetValueW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
CloseServiceHandle
GetLengthSid
OpenServiceW
OpenSCManagerW
QueryServiceStatus
PrivilegeCheck
LookupPrivilegeValueW
OpenThreadToken
OpenProcessToken
msvcrt
malloc
_write
_iob
fprintf
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
strrchr
_close
_open
exit
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
user32
ReleaseDC
GetDC
SetFocus
SetWindowTextW
SetForegroundWindow
SendDlgItemMessageW
GetDlgItemTextW
ScreenToClient
LoadStringW
SetDlgItemInt
FillRect
GetClientRect
GetSysColorBrush
DefWindowProcW
WinHelpW
LoadImageW
LoadCursorW
DispatchMessageW
DialogBoxParamW
MessageBoxW
CreateDialogParamW
GetDesktopWindow
MoveWindow
SetDlgItemTextW
ShowWindow
CharPrevW
CharNextW
IsDlgButtonChecked
GetWindowTextW
SendMessageW
GetDlgItem
EnableWindow
SetCursor
wsprintfW
IsWindow
BringWindowToTop
DestroyWindow
EndDialog
PeekMessageW
FindWindowW
UpdateWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
GetParent
MsgWaitForMultipleObjects
GetWindowLongW
PostMessageW
SetWindowLongW
CheckDlgButton
RegisterWindowMessageW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ