Static task
static1
Behavioral task
behavioral1
Sample
7aadbd40cea87dfda46e7344c0c19768809bc799373d5366592d50a34379f314.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7aadbd40cea87dfda46e7344c0c19768809bc799373d5366592d50a34379f314.exe
Resource
win10v2004-20221111-en
General
-
Target
7aadbd40cea87dfda46e7344c0c19768809bc799373d5366592d50a34379f314
-
Size
28KB
-
MD5
19bc693d7e408d381be339a6ac062557
-
SHA1
ace95c5dea352e1cf05883f5ce1f3b4f7b072a14
-
SHA256
7aadbd40cea87dfda46e7344c0c19768809bc799373d5366592d50a34379f314
-
SHA512
491b71d5c6c9cbfc44dc35e376c3fda1b71a18a13bd850ab6cb945ffb8683a83c0ee7742662382401b8b2e466f43a67e2a7a53d6e44cffd63caec8e731b7eddc
-
SSDEEP
384:Itu5JTqOSyYcLG5ua3gHml5/lAc3yq4vOZauAoCr9R:ItChqOcT53gUAGyduAoCr9
Malware Config
Signatures
Files
-
7aadbd40cea87dfda46e7344c0c19768809bc799373d5366592d50a34379f314.exe windows x86
4bd0022736f665eef83af43a40eb0a8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
FormatMessageA
HeapDestroy
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
LocalFree
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
CloseHandle
advapi32
OpenEventLogA
ClearEventLogA
CloseEventLog
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE