Static task
static1
Behavioral task
behavioral1
Sample
aeb21e75784fca795c44dcba14a423bfe77746d99bd613316d9519f16c21b439.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aeb21e75784fca795c44dcba14a423bfe77746d99bd613316d9519f16c21b439.exe
Resource
win10v2004-20220812-en
General
-
Target
aeb21e75784fca795c44dcba14a423bfe77746d99bd613316d9519f16c21b439
-
Size
138KB
-
MD5
d7fd12089c8c02c5adb5bced9d2f310a
-
SHA1
7c20a4175f59f62884c7440126938d570767e1c1
-
SHA256
aeb21e75784fca795c44dcba14a423bfe77746d99bd613316d9519f16c21b439
-
SHA512
32d2bc05b844a4ea2a83184207f584b1be69aeb928d76205f2346065494b12910444f14d47a4f57d9f0cad5efefadff72b6eb299b93b3c6252ccb82315050022
-
SSDEEP
3072:uMXVACmHeojOj/XS3vDq1MzAgbDHtpTCfo3CEBlweDRQspVs4:uMlAJjU/XS3eSjbDHtp7dQsM4
Malware Config
Signatures
Files
-
aeb21e75784fca795c44dcba14a423bfe77746d99bd613316d9519f16c21b439.exe windows x86
1d1bd81bfbd68308098d138ae02395f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetFileAttributesExW
OpenEventW
DuplicateHandle
GetCurrentProcessId
WriteProcessMemory
GetThreadContext
SetThreadContext
VirtualAlloc
GetProcessId
GetLastError
GetEnvironmentVariableW
FileTimeToDosDateTime
GetTempFileNameW
HeapReAlloc
FindFirstFileW
SetEndOfFile
CreateProcessW
HeapAlloc
SystemTimeToFileTime
SetFilePointerEx
HeapFree
GetProcessHeap
IsBadReadPtr
SetFileTime
VirtualQueryEx
Thread32First
GetVersionExW
ReadProcessMemory
VirtualFree
HeapDestroy
HeapCreate
Thread32Next
ReadFile
GetTimeZoneInformation
MultiByteToWideChar
GetTempPathW
GetFileSizeEx
OpenMutexW
VirtualProtectEx
VirtualAllocEx
FindClose
RemoveDirectoryW
FindNextFileW
VirtualProtect
GetFileTime
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
MoveFileExW
GetUserDefaultUILanguage
GetNativeSystemInfo
CreateToolhelp32Snapshot
GetComputerNameW
SetErrorMode
GetCommandLineW
CreateThread
GetLocalTime
LoadLibraryA
WaitForMultipleObjects
ReleaseMutex
SetLastError
Process32NextW
Process32FirstW
GlobalUnlock
GetTickCount
GlobalLock
GetSystemTime
ExpandEnvironmentStringsW
SetFileAttributesW
lstrcmpiW
WTSGetActiveConsoleSessionId
lstrcmpiA
LoadLibraryW
CreateDirectoryW
FreeLibrary
ExitProcess
LocalFree
VirtualFreeEx
OpenProcess
CreateRemoteThread
TlsFree
TlsAlloc
GetCurrentThreadId
CreateEventW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
CreateMutexW
CloseHandle
EnterCriticalSection
GetProcAddress
GetPrivateProfileIntW
FlushFileBuffers
CreateFileW
GetFileAttributesW
LeaveCriticalSection
InitializeCriticalSection
WriteFile
GetPrivateProfileStringW
GetModuleHandleW
Sleep
ResetEvent
SetThreadPriority
TerminateProcess
TlsSetValue
GetCurrentThread
SetEvent
WaitForSingleObject
WideCharToMultiByte
TlsGetValue
user32
GetKeyboardState
GetClipboardData
ToUnicode
CharLowerW
ExitWindowsEx
CharToOemW
RegisterClassExA
RegisterWindowMessageW
GetThreadDesktop
GetMenuItemID
SetKeyboardState
GetSubMenu
DefDlgProcW
DefFrameProcA
OpenInputDesktop
OpenDesktopW
MenuItemFromPoint
TranslateMessage
RegisterClassExW
GetMenuItemRect
TrackPopupMenuEx
SystemParametersInfoW
GetClassNameW
GetMenuState
DefWindowProcA
GetMessageA
SwitchDesktop
GetMenuItemCount
DefDlgProcA
DefMDIChildProcA
HiliteMenuItem
GetSystemMetrics
CreateDesktopW
CharLowerBuffA
SetProcessWindowStation
CloseWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
SetThreadDesktop
OpenWindowStationW
GetTopWindow
LoadImageW
MsgWaitForMultipleObjects
WindowFromPoint
CharLowerA
CharUpperW
SetWindowLongW
GetWindow
DispatchMessageW
MapVirtualKeyW
DrawIcon
GetWindowRect
SetCapture
MapWindowPoints
GetParent
GetIconInfo
GetMenu
GetClassLongW
GetMessagePos
SetCursorPos
GetWindowLongW
IsRectEmpty
DefWindowProcW
GetAncestor
PeekMessageW
PeekMessageA
SetWindowPos
RegisterClassW
GetUserObjectInformationW
CallWindowProcA
EndMenu
CallWindowProcW
DefFrameProcW
GetWindowThreadProcessId
RegisterClassA
GetShellWindow
EndPaint
GetUpdateRgn
GetMessageW
GetWindowDC
FillRect
PostMessageW
GetWindowInfo
DrawEdge
BeginPaint
GetCursorPos
SendMessageTimeoutW
IsWindow
ReleaseCapture
DefMDIChildProcW
SendMessageW
PrintWindow
EqualRect
PostThreadMessageW
ReleaseDC
GetDCEx
IntersectRect
GetDC
GetUpdateRect
GetCapture
advapi32
GetLengthSid
ConvertSidToStringSidW
EqualSid
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
InitiateSystemShutdownExW
IsWellKnownSid
CryptGetHashParam
OpenProcessToken
GetSidSubAuthority
CryptAcquireContextW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
RegCreateKeyExW
CryptReleaseContext
RegQueryValueExW
CreateProcessAsUserW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
CryptCreateHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptDestroyHash
AdjustTokenPrivileges
RegSetValueExW
CryptHashData
shlwapi
StrStrIA
PathRemoveFileSpecW
wvnsprintfA
StrCmpNIA
PathMatchSpecW
PathUnquoteSpacesW
PathAddExtensionW
PathCombineW
SHDeleteKeyW
PathSkipRootW
SHDeleteValueW
PathAddBackslashW
PathFindFileNameW
PathIsDirectoryW
wvnsprintfW
UrlUnescapeA
PathRemoveBackslashW
PathRenameExtensionW
PathIsURLW
StrStrIW
StrCmpNIW
PathQuoteSpacesW
shell32
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
secur32
GetUserNameExW
ole32
StringFromGUID2
CLSIDFromString
CoUninitialize
CoCreateInstance
CoInitializeEx
gdi32
GetDeviceCaps
CreateCompatibleBitmap
CreateDIBSection
SetViewportOrgEx
DeleteDC
GdiFlush
DeleteObject
SelectObject
SetRectRgn
CreateCompatibleDC
GetDIBits
RestoreDC
SaveDC
ws2_32
getsockname
WSAEventSelect
freeaddrinfo
recv
sendto
select
getaddrinfo
recvfrom
WSAIoctl
connect
WSAAddressToStringW
WSAStartup
WSAGetLastError
shutdown
setsockopt
bind
socket
WSASetLastError
accept
getpeername
WSASend
closesocket
send
listen
crypt32
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertCloseStore
CertOpenSystemStoreW
CertDeleteCertificateFromStore
CryptUnprotectData
PFXExportCertStoreEx
wininet
InternetQueryOptionA
InternetSetOptionA
InternetQueryOptionW
HttpAddRequestHeadersW
InternetSetStatusCallbackW
GetUrlCacheEntryInfoW
HttpSendRequestW
InternetReadFile
InternetReadFileExA
InternetQueryDataAvailable
HttpSendRequestExW
HttpSendRequestExA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCrackUrlA
InternetConnectA
HttpQueryInfoA
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
netapi32
NetApiBufferFree
NetUserEnum
NetUserGetInfo
Sections
.text Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ