Static task
static1
Behavioral task
behavioral1
Sample
ae693c41c3a9ca506fa3d737329e307edf548221d9f9c1d21158d760534b7de8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae693c41c3a9ca506fa3d737329e307edf548221d9f9c1d21158d760534b7de8.exe
Resource
win10v2004-20220901-en
General
-
Target
ae693c41c3a9ca506fa3d737329e307edf548221d9f9c1d21158d760534b7de8
-
Size
800KB
-
MD5
803fd0050ba2d539017e9fa6efd1ea27
-
SHA1
eaf496fa3255aceecdb170c43190a9b628f03b75
-
SHA256
ae693c41c3a9ca506fa3d737329e307edf548221d9f9c1d21158d760534b7de8
-
SHA512
b8747c794eb0b0a7a9bda2af480c1d43da7ed054e30a83e33376e104d7774a1e57e42856c4925421b75e215a76e67515ffe8496b9dd855f285b634b8f1d48ab3
-
SSDEEP
12288:iMcNIJl3u5ssGW2e+eMaloP7HfTP4wHBTymsH+iSnwzuk6KB4ct2YdgtCtg:ijwx3PeTlgTP4whq+iSn6z8
Malware Config
Signatures
Files
-
ae693c41c3a9ca506fa3d737329e307edf548221d9f9c1d21158d760534b7de8.exe windows x86
a811ef46438557798b90d558b124bca9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapUserPhysicalPages
DeleteVolumeMountPointA
EndUpdateResourceW
CreateJobObjectW
GetSystemDefaultLCID
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetCalendarInfoW
GetConsoleAliasW
WriteConsoleW
LCMapStringA
GetStdHandle
GetLastError
GetProcAddress
GetConsoleAliasExesLengthA
EnumSystemCodePagesW
CreateMemoryResourceNotification
LoadLibraryA
WriteConsoleA
LocalAlloc
CreateTapePartition
SetProcessWorkingSetSize
SetThreadIdealProcessor
OpenJobObjectW
FoldStringA
FindFirstChangeNotificationA
GetVolumeNameForVolumeMountPointW
AddConsoleAliasA
TlsGetValue
VirtualAlloc
GetComputerNameA
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleOutputCP
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
GetLocaleInfoA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
RaiseException
advapi32
BackupEventLogW
ReportEventW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 607KB - Virtual size: 619KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ