Static task
static1
Behavioral task
behavioral1
Sample
ae20a272b8a1c0cfa243eeb9a01fd9c5a23ed85a00a354e93febe5faf6afce42.exe
Resource
win10v2004-20221111-en
General
-
Target
ae20a272b8a1c0cfa243eeb9a01fd9c5a23ed85a00a354e93febe5faf6afce42
-
Size
260KB
-
MD5
cf4831f3bdc28443b283f38967fbbfba
-
SHA1
0d9e03ffecf9a616826994ddf0964c28bd85d0a4
-
SHA256
ae20a272b8a1c0cfa243eeb9a01fd9c5a23ed85a00a354e93febe5faf6afce42
-
SHA512
32d618e919be294d5d4a9ab6532b2673cb2ad696bef06fe12c1cfa0615847436ac80e7f73d5c209ede80f57d98a0251787c8d6e9e328b1f3bab2495821c400ae
-
SSDEEP
6144:l7w8V5OdOzkLOimj9CHCQx0Xwj6WgAXU+1:ZwBYzkLDMa0XwjdR1
Malware Config
Signatures
Files
-
ae20a272b8a1c0cfa243eeb9a01fd9c5a23ed85a00a354e93febe5faf6afce42.exe windows x86
29a62d14d89b432fd6115525abce5c2c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CreateFileW
FindActCtxSectionGuid
WriteConsoleInputW
GetWindowsDirectoryA
FindFirstVolumeMountPointA
FindFirstChangeNotificationA
WaitForSingleObject
ReadConsoleInputA
VerifyVersionInfoW
GetVersionExA
GetCurrentProcess
OpenEventA
CreateFileMappingA
GetLocaleInfoW
GetProcAddress
LoadLibraryA
GlobalAlloc
DeleteTimerQueueTimer
GetConsoleTitleA
CopyFileA
FindResourceA
GetBinaryTypeW
SetLastError
GetProfileSectionW
WriteProfileStringW
GetConsoleAliasA
WritePrivateProfileSectionW
SetVolumeMountPointA
EnumResourceLanguagesW
CommConfigDialogA
_hread
EnumDateFormatsW
ActivateActCtx
DeleteVolumeMountPointA
WritePrivateProfileStringA
GetSystemDirectoryA
GetStringTypeA
GetLongPathNameA
FindNextFileW
EnumCalendarInfoA
LocalAlloc
ReleaseActCtx
FindFirstFileA
CreateFileA
WriteConsoleW
LoadLibraryW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RtlUnwind
RaiseException
DeleteFileA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
user32
GetMenuBarInfo
GetMessageTime
shell32
FindExecutableA
ole32
CoGetInstanceFromIStorage
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mutag Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nusilod Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jabozaj Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fumohex Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dujexus Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ