Static task
static1
Behavioral task
behavioral1
Sample
aeefa61a768487585028f42f705e3ddaf32137846b79b9a307cfc940403c9fdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aeefa61a768487585028f42f705e3ddaf32137846b79b9a307cfc940403c9fdf.exe
Resource
win10v2004-20220812-en
General
-
Target
aeefa61a768487585028f42f705e3ddaf32137846b79b9a307cfc940403c9fdf
-
Size
20KB
-
MD5
5b588f1133dfd2643851fd0d327a1f12
-
SHA1
bdb33da96fc4ff8883fe49981099f03478679a4e
-
SHA256
aeefa61a768487585028f42f705e3ddaf32137846b79b9a307cfc940403c9fdf
-
SHA512
be150e1fd15c3e4e183b2d247e798c1517380a91985fcbbf70fc921ead5da62528c5e4b7f123d02928faef1c1f65e80878da63e24ab23273fce71ef249b199f1
-
SSDEEP
192:7O7XTRnRflKJCtPQYFN5WatIg50wlL1gxSq11bNNvIDs0WJyBjI59ZZXmUw:7O7XTRnFcLY503dNwMoI59ZZO
Malware Config
Signatures
Files
-
aeefa61a768487585028f42f705e3ddaf32137846b79b9a307cfc940403c9fdf.exe windows x86
6cd4594e4a61fd421c0468f57a0273a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ord497
ord775
ord490
ord374
ord429
ord781
ord766
ord686
ord321
ord461
ord465
ord713
ord714
ord463
ord352
ord395
ord289
ord214
ord271
ord306
ord592
ord704
ord350
ord268
ord276
ord740
ord269
ord323
ord729
ord282
ord361
ord654
ord334
ord397
ord464
user32
ord453
ord614
ord229
ord490
ord231
ord291
gdi32
ord249
comctl32
ord84
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 823B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 526B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE