Static task
static1
Behavioral task
behavioral1
Sample
aacdd10317507ed807cddf46bd4802a94706049d1cdf92b0023a5a77913d485c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aacdd10317507ed807cddf46bd4802a94706049d1cdf92b0023a5a77913d485c.exe
Resource
win10v2004-20221111-en
General
-
Target
aacdd10317507ed807cddf46bd4802a94706049d1cdf92b0023a5a77913d485c
-
Size
152KB
-
MD5
d20d054a6f56e99b91441592f4af0060
-
SHA1
8885f60dece81b69182c1d8905b435a879d4788d
-
SHA256
aacdd10317507ed807cddf46bd4802a94706049d1cdf92b0023a5a77913d485c
-
SHA512
53d72091ffc3a4378b76563c55247d283f35cc3ac84b78ddbfcd9750598ec5263c5ed4a0bee09bdcf8a57a5d5a2ae2dfc568532734b4f9e8fafe656881f74d21
-
SSDEEP
1536:8gUi5Z2JpZ/9w/NdBg5oLydyowSVvh3o2gZ:DUij2bZVwVdBg5WOZ3o
Malware Config
Signatures
Files
-
aacdd10317507ed807cddf46bd4802a94706049d1cdf92b0023a5a77913d485c.exe windows x86
b4741bb55eaf4ca22b140f3203faa4b4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
LoadLibraryA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetStringTypeA
GetProcAddress
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
GetLastError
SetConsoleCtrlHandler
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCPInfo
GetACP
CloseHandle
user32
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassA
MessageBoxA
CreateWindowExA
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
gdi32
GetStockObject
Sections
.text Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.T� Size: - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qiqhsvx Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE