Static task
static1
Behavioral task
behavioral1
Sample
aa97e636ddf6399c38d09cccb97d013a302ff3aeffd6dab33d363dcf4bd8cdbc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa97e636ddf6399c38d09cccb97d013a302ff3aeffd6dab33d363dcf4bd8cdbc.exe
Resource
win10v2004-20220901-en
General
-
Target
aa97e636ddf6399c38d09cccb97d013a302ff3aeffd6dab33d363dcf4bd8cdbc
-
Size
365KB
-
MD5
35a71c8b22b5c774df62c159f412b9a7
-
SHA1
7aa054d764ea84fb829b138c8fbf6cd0ca433b9d
-
SHA256
aa97e636ddf6399c38d09cccb97d013a302ff3aeffd6dab33d363dcf4bd8cdbc
-
SHA512
294fb797fe919d7db7931e1636f83ad849582ea709add30dd2d927d519b160d2b7369cdd56ee24188c716c1490da77bc9908316abf14b4d1dc325eee90ce0188
-
SSDEEP
6144:lFEvx0NXgEJL8kTvI/qFUmZQab7T5kaRJMggJEEVlRbkSD+WyWIaNmp:lFEvC+EJVTU5OQdaRag4ESluSDj3q
Malware Config
Signatures
Files
-
aa97e636ddf6399c38d09cccb97d013a302ff3aeffd6dab33d363dcf4bd8cdbc.exe windows x86
aa63b8ab21d59ad44a49bf9a7950e3ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
EnumResourceTypesA
LoadLibraryExW
GetModuleHandleA
SetLastError
GetLastError
GetTickCount
GetComputerNameA
CloseHandle
VirtualProtect
Sleep
ReleaseMutex
FreeConsole
TlsGetValue
GetDiskFreeSpaceExW
GetExitCodeProcess
GetDriveTypeA
FindClose
DeleteCriticalSection
GetCommandLineA
shell32
DllGetVersion
DragQueryFileA
DragAcceptFiles
SHFree
ShellAboutA
SHGetNewLinkInfo
ShellMessageBoxA
SHGetDiskFreeSpaceA
DragFinish
StrChrA
SHGetSettings
SheChangeDirA
SHGetMalloc
glmf32
glsChannel
glsBinary
glsBlock
glsComment
glsAppRef
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ