Static task
static1
Behavioral task
behavioral1
Sample
aa7e25c7a93aef3592f0dbcc617be1d8cb3b4fcb72f3b563080105b19aa6e921.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa7e25c7a93aef3592f0dbcc617be1d8cb3b4fcb72f3b563080105b19aa6e921.exe
Resource
win10v2004-20220812-en
General
-
Target
aa7e25c7a93aef3592f0dbcc617be1d8cb3b4fcb72f3b563080105b19aa6e921
-
Size
109KB
-
MD5
2d6464f50d78647d533ee3cd2009003d
-
SHA1
2254cd9b598d469bc0bd6ba9d87e7216ecd4c662
-
SHA256
aa7e25c7a93aef3592f0dbcc617be1d8cb3b4fcb72f3b563080105b19aa6e921
-
SHA512
17c51cee013fa3218e35f96a214afc84b358883e1436199dd170aa222dbc1300a197615639e48d95b463bef4a9fed246e31c036597d2ab4dd42a01e605e9697e
-
SSDEEP
3072:s/+kaOA1i1F7CfTnfJwyExidyX8NF1OZuoT+yUT7PoV/:tB1i1qnf+jfOLQV+yUT7QV/
Malware Config
Signatures
Files
-
aa7e25c7a93aef3592f0dbcc617be1d8cb3b4fcb72f3b563080105b19aa6e921.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
@0dU,: Size: - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 356B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 512B - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
@0dU,: Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
@0dU,: Size: 451B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE