Static task
static1
Behavioral task
behavioral1
Sample
ae01fcc3779e8ac0da0fea7319e6cae1addb2a5bea4b8c0c33353f7b82879571.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ae01fcc3779e8ac0da0fea7319e6cae1addb2a5bea4b8c0c33353f7b82879571.exe
Resource
win10v2004-20230220-en
General
-
Target
ae01fcc3779e8ac0da0fea7319e6cae1addb2a5bea4b8c0c33353f7b82879571
-
Size
5.0MB
-
MD5
5040144ebd3f0986bcb4431ad7b56841
-
SHA1
abae382e706f44cf2edecfe2d120948fdf76edc1
-
SHA256
ae01fcc3779e8ac0da0fea7319e6cae1addb2a5bea4b8c0c33353f7b82879571
-
SHA512
d82d7647f2605586ce19f5e455952401dc0984702ff280527518ad270ea67f80d72bb6ab1eb113716d7329637b9f4316b46fab4618283033f987250bd8c6e02a
-
SSDEEP
49152:bi4ykbzzUnjQQaraUTNQCPAuSGJqdtBOibny2EurFKPnh8tkYkSd:WkiQQaXTrSGJfiLy/ichKkG
Malware Config
Signatures
Files
-
ae01fcc3779e8ac0da0fea7319e6cae1addb2a5bea4b8c0c33353f7b82879571.exe windows x86
e7d6d7012a8d4d2fa4567b4d09a5c26a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
ReadFile
lstrlenW
LoadLibraryW
GetCurrentDirectoryW
CreateFileW
VerSetConditionMask
OpenProcess
MulDiv
VerifyVersionInfoW
GetACP
ExitProcess
WriteFile
SetFilePointer
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryW
GetFileAttributesW
LocalFree
GlobalAlloc
GetModuleHandleA
GetLocalTime
lstrcpynW
lstrcpyW
VirtualQuery
MoveFileW
InitializeCriticalSection
WaitForSingleObject
FindClose
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetTempPathW
RemoveDirectoryW
CreateFileA
DeleteFileW
FindFirstFileW
GetStartupInfoW
GlobalFree
LocalAlloc
GetFileInformationByHandle
GetHandleInformation
GetLogicalDriveStringsW
CreateProcessW
QueryDosDeviceW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeviceIoControl
GetSystemDirectoryA
GetEnvironmentVariableW
GetDriveTypeW
VirtualAlloc
VirtualFree
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GlobalLock
FreeLibraryAndExitThread
VirtualProtect
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RtlUnwind
GetTimeZoneInformation
GetModuleHandleExW
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
ReadConsoleW
SetEndOfFile
WriteConsoleW
GetFileAttributesExW
FlushFileBuffers
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
GlobalMemoryStatus
SetEvent
CloseHandle
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
QueryPerformanceFrequency
QueryPerformanceCounter
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
Sleep
CreateEventW
SetLastError
TryEnterCriticalSection
GetStringTypeW
WideCharToMultiByte
FormatMessageW
OutputDebugStringW
IsDebuggerPresent
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
GlobalUnlock
GetThreadTimes
GetFullPathNameW
ExitThread
PeekNamedPipe
WaitForMultipleObjects
GetEnvironmentVariableA
CompareFileTime
GetSystemDirectoryW
SleepEx
InitializeSListHead
FindResourceExW
CreateThread
CopyFileW
MoveFileExW
SetErrorMode
GetModuleFileNameA
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
GetModuleHandleW
GetProcAddress
FindResourceW
LoadResource
LockResource
FreeResource
InterlockedDecrement
SizeofResource
GetTickCount
DeleteCriticalSection
GetCurrentThreadId
GetProcessHeap
GetCurrentProcessId
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetCommandLineW
FindNextFileW
HeapFree
user32
GetWindowRgn
MoveWindow
UpdateLayeredWindow
MessageBoxW
SetWindowRgn
InflateRect
SetCursor
MonitorFromPoint
LoadCursorW
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
ShowWindow
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
GetMonitorInfoW
MonitorFromWindow
LoadImageW
GetWindow
GetParent
SetWindowLongW
GetWindowLongW
PtInRect
IsRectEmpty
DrawTextA
UnionRect
IntersectRect
DrawTextW
MapWindowPoints
GetGUIThreadInfo
GetCursorPos
GetWindowRect
GetClientRect
InvalidateRect
GetUpdateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
SetTimer
FillRect
SetRect
CreatePopupMenu
DestroyMenu
EnableMenuItem
AppendMenuW
TrackPopupMenu
CreateCaret
ReleaseCapture
SetCapture
GetKeyState
GetFocus
GetActiveWindow
SetFocus
IsZoomed
IsIconic
IsWindowVisible
SetWindowPos
CreateAcceleratorTableW
GetCursor
FindWindowW
GetCaretBlinkTime
HideCaret
ShowCaret
SetCaretPos
GetCaretPos
ClientToScreen
UpdateWindow
PrivateExtractIconsW
DestroyIcon
DrawIconEx
IsWindow
CreateWindowExW
SendMessageW
GetProcessWindowStation
GetDesktopWindow
MapVirtualKeyExW
GetKeyNameTextW
GetKeyboardLayout
GetUserObjectInformationW
EqualRect
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
IsWindowEnabled
CharPrevW
GetSysColor
wsprintfA
OffsetRect
SetForegroundWindow
DestroyWindow
ActivateKeyboardLayout
PostQuitMessage
GetMessageW
DispatchMessageW
PeekMessageW
CharNextW
TranslateMessage
PostMessageW
ScreenToClient
InvalidateRgn
advapi32
CryptEnumProvidersW
RegEnumKeyExW
RegSetValueExW
ImpersonateLoggedOnUser
GetUserNameW
RevertToSelf
RegQueryValueExW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashW
RegOpenKeyExW
CryptGenRandom
RegDeleteValueW
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
ole32
CLSIDFromProgID
DoDragDrop
OleDuplicateData
ReleaseStgMedium
CreateStreamOnHGlobal
CLSIDFromString
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
OleLockRunning
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathIsDirectoryW
SHDeleteKeyW
PathCombineW
PathFindFileNameW
PathFileExistsW
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
psapi
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
dbghelp
MiniDumpWriteDump
urlmon
ObtainUserAgentString
gdi32
SetBkColor
CreateCompatibleBitmap
CreateCompatibleDC
ExtSelectClipRgn
SelectClipRgn
LineTo
GetTextExtentPoint32W
MoveToEx
TextOutW
GdiFlush
CreatePatternBrush
GetTextExtentPointA
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
GetBitmapBits
SetTextColor
BitBlt
SetStretchBltMode
CreatePenIndirect
CombineRgn
CreateDIBSection
PtInRegion
CreateRectRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
GetTextMetricsW
PlayEnhMetaFile
GetEnhMetaFileHeader
CreateEnhMetaFileW
CloseEnhMetaFile
SelectObject
SaveDC
RestoreDC
Rectangle
RemoveFontMemResourceEx
AddFontMemResourceEx
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateDIBitmap
StretchBlt
SetBkMode
GetObjectA
SetBitmapBits
shell32
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetFolderPathW
DragQueryFileW
comctl32
_TrackMouseEvent
ord17
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLine
ord1
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipLoadImageFromStream
GdipDeleteFont
GdipLoadImageFromStreamICM
GdipCloneImage
GdipDisposeImage
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipSetTextRenderingHint
GdiplusStartup
GdipDrawRectangleI
GdipDrawPath
GdipFillRectangleI
GdipFillPath
GdipMeasureString
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipDrawImageRectI
GdipGetPropertyItem
GdipCreateFontFromDC
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipStringFormatGetGenericTypographic
GdipDeleteStringFormat
GdipCloneStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipGetImageWidth
GdipCreateFontFromLogfontA
GdipDrawString
GdipSetInterpolationMode
GdipGetPropertyItemSize
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
crypt32
CertGetEnhancedKeyUsage
CryptQueryObject
CertGetNameStringW
CertDuplicateCertificateContext
CertOpenStore
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertGetCertificateContextProperty
CertEnumCertificatesInStore
ws2_32
ntohs
getnameinfo
sendto
recvfrom
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
gethostbyname
gethostname
WSAStartup
WSACloseEvent
freeaddrinfo
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
listen
htonl
accept
WSACleanup
WSAIoctl
WSASetLastError
socket
setsockopt
shutdown
htons
getsockopt
getsockname
getpeername
connect
closesocket
recv
send
WSAGetLastError
bind
wldap32
ord147
ord219
ord46
ord301
ord145
ord133
ord79
ord142
ord167
ord127
ord27
ord26
ord117
ord41
ord208
ord216
ord14
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 561KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ