IAEModule_AEModule_PutKernel
IAEModule_IAEKernel_LoadModule
IAEModule_IAEKernel_UnloadModule
_WinMainSandboxed@20
Static task
static1
Behavioral task
behavioral1
Sample
Alien Attack Team 2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Alien Attack Team 2.exe
Resource
win10v2004-20221111-en
Target
Alien Attack Team 2.exe
Size
24.0MB
MD5
384e27d74b6e2704012e71a924702b0c
SHA1
3dfec1ee7e1d236d331066fbb7d899ffb98187b4
SHA256
8b5259859422946b05596f0b30299ef1bd411df76040a93be49b5d035aeb19a5
SHA512
900abd37e9d8d52e2df30f33fb3f406f954192cf1b0e63e6a281f4f9c4abd00fcfe296dd186b34aacfc90308cbbd17e893265b29f7dd0e013171f3d658f562f4
SSDEEP
393216:/kMdNR9O0tw5p6kDlG6Kk//9DFiLKZa7TCRe0IAEychn4rXzUPrfYmq5AhujJcvP:/xdv9Ozj6kDlf//+KZBwHAlM4LuDYmq0
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetStartupInfoW
GetCommandLineA
GetCommandLineW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
CreateDirectoryW
RemoveDirectoryW
CreateFileA
CreateFileW
GetFileAttributesA
DeleteFileW
FindFirstFileW
CopyFileW
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
HeapSize
HeapLock
HeapUnlock
HeapWalk
DebugBreak
CreateThread
OpenThread
SetThreadPriority
QueueUserAPC
TlsAlloc
TlsFree
SleepEx
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
FreeLibrary
GetProcessTimes
GetCurrentProcess
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
LoadLibraryA
SetCurrentDirectoryW
GetCurrentDirectoryW
QueryPerformanceCounter
QueryPerformanceFrequency
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
SetUnhandledExceptionFilter
FindNextFileW
GetCPInfo
IsDBCSLeadByte
VerSetConditionMask
LockResource
GlobalFree
ExitThread
LoadResource
CreateProcessA
FindResourceExA
FindResourceExW
GetSystemDirectoryA
GetFileAttributesW
MoveFileExW
GetVersionExW
VerifyVersionInfoW
GetUserDefaultUILanguage
GetUserDefaultLangID
GetLongPathNameW
GetFileInformationByHandle
GetFileSizeEx
DeviceIoControl
SetFilePointerEx
lstrlenW
CreateMutexA
CreateProcessW
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
OutputDebugStringA
GetTempPathA
GetTempFileNameA
GetSystemWow64DirectoryW
CreateDirectoryA
GetFullPathNameW
GetFileAttributesExW
DeleteFileA
GetVolumeInformationW
TlsSetValue
SetEvent
ResetEvent
WaitForMultipleObjects
GetTickCount
CreateEventW
GetSystemTime
GetTimeZoneInformation
SystemTimeToFileTime
GetCurrentThread
GetExitCodeThread
DuplicateHandle
MapViewOfFile
UnmapViewOfFile
LCMapStringW
GetLocaleInfoW
TerminateThread
CreateWaitableTimerW
ReleaseSemaphore
CreateSemaphoreW
SetThreadAffinityMask
ReleaseMutex
CreateFileMappingA
CompareFileTime
IsDebuggerPresent
OutputDebugStringW
EncodePointer
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
LoadLibraryExA
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
RtlUnwind
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
GetStringTypeW
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapReAlloc
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
WriteConsoleW
ReadConsoleW
GlobalMemoryStatus
FlushConsoleInputBuffer
TlsGetValue
GetSystemInfo
CloseHandle
FindClose
SetFilePointer
SetEndOfFile
ReadFile
WriteFile
GetFileSize
Sleep
WaitForSingleObject
DeleteCriticalSection
TryEnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetLastError
GetCurrentThreadId
CreateEventA
CreateSemaphoreA
GlobalMemoryStatusEx
SetSystemTime
FileTimeToSystemTime
GetVersionExA
ResumeThread
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
InterlockedExchangeAdd
GetVersion
VerifyVersionInfoA
GetProcessAffinityMask
GetNumberFormatW
GetCurrencyFormatW
ReadConsoleInputA
SetConsoleMode
FreeLibraryAndExitThread
SwitchToThread
RaiseException
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetExitCodeProcess
ExitProcess
GetProcAddress
InterlockedCompareExchange
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
SetLastError
DecodePointer
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGetHashParam
CryptSetKeyParam
CryptDestroyKey
CryptAcquireContextA
RegOpenKeyA
ReportEventA
RegisterEventSourceA
DeregisterEventSource
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCreateKeyExA
RegCloseKey
CryptHashData
IAEModule_AEModule_PutKernel
IAEModule_IAEKernel_LoadModule
IAEModule_IAEKernel_UnloadModule
_WinMainSandboxed@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ