Static task
static1
Behavioral task
behavioral1
Sample
aab4d9abc31e063a0e1ff0d591b93882d87a934aaeff79c66fa5faca31a8a158.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aab4d9abc31e063a0e1ff0d591b93882d87a934aaeff79c66fa5faca31a8a158.exe
Resource
win10v2004-20220812-en
General
-
Target
aab4d9abc31e063a0e1ff0d591b93882d87a934aaeff79c66fa5faca31a8a158
-
Size
879KB
-
MD5
e71d8a82219203fa6d9ae5f32fb869f0
-
SHA1
0f67f6c1dc6e416cfc9ca525d2a2286390019dea
-
SHA256
aab4d9abc31e063a0e1ff0d591b93882d87a934aaeff79c66fa5faca31a8a158
-
SHA512
ce84f2d5529d9d14f1738e7c664c2df0be9231f45be991369e2d6ddf703653c4bc42b4473b4e6266b3d0a498d5ef189567d79b9f49451cd1cc713302505a347f
-
SSDEEP
12288:lmMRSzG81BNxdMVwQHEwmefG2S19RToOxXcLyNEvGugPFBuBx3Oj9FQLw:lGzNOVvHEwnfG28pXoyNOGugtEx+FSw
Malware Config
Signatures
Files
-
aab4d9abc31e063a0e1ff0d591b93882d87a934aaeff79c66fa5faca31a8a158.exe windows x86
fed44cf2a99fbe397e64db485eaf8c4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
IsDebuggerPresent
lstrlenA
GetCommandLineA
CreateFileW
GetModuleHandleA
FindClose
GetConsoleTitleA
GetModuleFileNameW
CreateFileMappingW
CloseHandle
Sleep
GlobalSize
HeapCreate
DeviceIoControl
GetDriveTypeW
DeleteFileA
GetStartupInfoA
CloseHandle
LocalFlags
user32
FillRect
GetWindowLongW
DrawTextW
IsZoomed
DestroyMenu
DestroyWindow
LoadImageA
PeekMessageA
BeginPaint
DispatchMessageA
DispatchMessageA
IsWindow
CallWindowProcW
dssec
DSEditSecurity
DSEditSecurity
DSEditSecurity
DSEditSecurity
imagehlp
ImageUnload
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ