Static task
static1
Behavioral task
behavioral1
Sample
aedad35386ffe579b4ad71335c7292cab260e59052e947d8462ef8e014a1a0a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aedad35386ffe579b4ad71335c7292cab260e59052e947d8462ef8e014a1a0a9.exe
Resource
win10v2004-20220812-en
General
-
Target
aedad35386ffe579b4ad71335c7292cab260e59052e947d8462ef8e014a1a0a9
-
Size
125KB
-
MD5
556ef418cf580872edd762f3b1394f4c
-
SHA1
0d7fc48cc31d71fa014af41c10ae6b9988fbaee9
-
SHA256
aedad35386ffe579b4ad71335c7292cab260e59052e947d8462ef8e014a1a0a9
-
SHA512
0851b0228d0da2dc61bd111c35a63b38c64363fb8a2fa341defc680625623dbe9018885a682d988afe85b671f81375b7e63ecc44b1a217740d6ffda9c1041630
-
SSDEEP
3072:YXk45JJeQVtEzV3pf++Jg1avtx3xPOTd0bA0xbtVdRYx:kL4QVti++JfzxFE85Vj
Malware Config
Signatures
Files
-
aedad35386ffe579b4ad71335c7292cab260e59052e947d8462ef8e014a1a0a9.exe windows x86
6ae8eeefee97eb402fc0bffaefd4d27a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
IsBadStringPtrA
CommConfigDialogA
GetModuleFileNameA
CreateSemaphoreA
GlobalFix
GetProcAddress
UpdateResourceA
GetProcessWorkingSetSize
GetTickCount
GetCurrentThread
IsBadHugeReadPtr
GlobalHandle
DeleteFiber
SetLastError
CreateRemoteThread
GetSystemDefaultUILanguage
CloseHandle
SetFileAttributesA
GlobalFree
GlobalFlags
SizeofResource
ConnectNamedPipe
FlushInstructionCache
CreateMutexA
FindFirstChangeNotificationA
HeapCreate
WaitForMultipleObjects
GetExitCodeProcess
WritePrivateProfileSectionA
GetProcessHeaps
MapViewOfFile
WideCharToMultiByte
ResetEvent
EndUpdateResourceA
CopyFileA
GetThreadContext
GlobalFindAtomA
CreateIoCompletionPort
GetUserDefaultUILanguage
CreateFileA
GlobalCompact
GlobalAddAtomA
GetShortPathNameA
HeapDestroy
HeapFree
HeapValidate
CreateWaitableTimerA
ContinueDebugEvent
IsProcessorFeaturePresent
SearchPathA
MoveFileA
Sleep
CopyFileExA
GetCommConfig
GetVolumeInformationA
ClearCommError
FlushViewOfFile
GetThreadTimes
OpenEventA
GetFileType
PostQueuedCompletionStatus
GetLargestConsoleWindowSize
LocalUnlock
RemoveDirectoryA
IsSystemResumeAutomatic
CreateDirectoryA
LockResource
GetCPInfoExA
GetModuleHandleA
GetSystemDefaultLCID
VirtualLock
GetFullPathNameA
GlobalReAlloc
VirtualFreeEx
GetLocalTime
GetConsoleOutputCP
GetConsoleCP
GetCommandLineA
GetEnvironmentVariableA
WaitForSingleObject
MultiByteToWideChar
SleepEx
GetSystemDefaultLangID
GetPrivateProfileStringA
FindResourceExA
GetPrivateProfileSectionNamesA
PurgeComm
GetProfileSectionA
ReadFile
SignalObjectAndWait
GetProfileStringA
LocalShrink
GetFileAttributesA
IsBadReadPtr
DosDateTimeToFileTime
AddAtomA
CallNamedPipeA
GetPrivateProfileSectionA
GetProcessTimes
GetProcessHeap
HeapAlloc
SetFileTime
HeapReAlloc
DuplicateHandle
ReleaseMutex
GetPriorityClass
FlushFileBuffers
FreeResource
GetSystemDirectoryA
FlushConsoleInputBuffer
GetStdHandle
CreateFiber
CreateEventA
FreeLibrary
DeviceIoControl
DeleteAtom
WriteProfileSectionA
LoadResource
MoveFileExA
CancelIo
WriteProfileStringA
GetLogicalDrives
QueryDosDeviceA
InitAtomTable
GetCommTimeouts
GetNamedPipeHandleStateA
GetThreadPriorityBoost
GetStartupInfoA
msvcrt
srand
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE