Static task
static1
Behavioral task
behavioral1
Sample
aa63761ecbb6c88d34e1a91211827a010ffe22052f28170dbc2ce9319c593eaf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa63761ecbb6c88d34e1a91211827a010ffe22052f28170dbc2ce9319c593eaf.exe
Resource
win10v2004-20220812-en
General
-
Target
aa63761ecbb6c88d34e1a91211827a010ffe22052f28170dbc2ce9319c593eaf
-
Size
126KB
-
MD5
c31e52f65618f81dfd2fc76ef2ed299f
-
SHA1
956f19b47c4aafdcb87459b22024237b43c1cc3b
-
SHA256
aa63761ecbb6c88d34e1a91211827a010ffe22052f28170dbc2ce9319c593eaf
-
SHA512
fb973a02b0cf4b18dc853661085cc6094c083b33db783fe5b3a3980f740746d082cdc36d62d7b39f85c14f7b2d2914040f4368188e44b39c03498f7ccb1e9d7b
-
SSDEEP
3072:12hd8n+RsGcAXermlBYvzFGxsRmdZ0vpbBeMtJ:17osoeriAF6lduvpbB1
Malware Config
Signatures
Files
-
aa63761ecbb6c88d34e1a91211827a010ffe22052f28170dbc2ce9319c593eaf.exe windows x86
3faba89b21669cf37d7c48d6c1d3edb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetLastError
FormatMessageA
DisconnectNamedPipe
MapViewOfFileEx
IsProcessorFeaturePresent
GetProcAddress
GetFileAttributesA
GetCommandLineA
GlobalAlloc
IsBadStringPtrA
GetLastError
GetFileTime
GetSystemDefaultLCID
BeginUpdateResourceA
HeapFree
WaitForMultipleObjectsEx
GetStdHandle
LocalUnlock
FoldStringA
GetDiskFreeSpaceA
GetCurrentProcess
MoveFileA
ReadProcessMemory
GetFileType
FindResourceExA
DefineDosDeviceA
LocalSize
LocalLock
GetCommTimeouts
GetCurrentThreadId
GetPriorityClass
FreeLibrary
ResumeThread
GetProfileStringA
OpenSemaphoreA
GetProcessTimes
GetSystemDefaultLangID
IsDebuggerPresent
FlushViewOfFile
WriteFile
GetThreadSelectorEntry
FlushInstructionCache
GetProfileIntA
GetLocalTime
SetFileTime
MultiByteToWideChar
SetErrorMode
LoadResource
GetCPInfoExA
GlobalUnfix
GlobalUnlock
GetVolumeInformationA
FreeResource
UnlockFile
PostQueuedCompletionStatus
Beep
GetDriveTypeA
GetThreadContext
CancelIo
VirtualFreeEx
WaitNamedPipeA
GetCurrentThread
CloseHandle
GetProcessVersion
Sleep
IsBadHugeWritePtr
GetNamedPipeHandleStateA
GetLargestConsoleWindowSize
SizeofResource
AddAtomA
AllocConsole
VirtualAlloc
GetConsoleCursorInfo
DeviceIoControl
GetNamedPipeInfo
LocalFlags
GlobalFlags
WaitForSingleObject
LocalShrink
WritePrivateProfileStructA
HeapDestroy
CreateRemoteThread
GetThreadTimes
IsSystemResumeAutomatic
CreateMutexA
CreateConsoleScreenBuffer
GetExitCodeThread
SleepEx
GetLongPathNameA
LocalCompact
IsBadCodePtr
GetVersion
CreateDirectoryA
FindNextChangeNotification
AreFileApisANSI
GetProcessHeaps
LockResource
ReleaseSemaphore
GlobalFree
UnmapViewOfFile
CopyFileA
GetThreadPriority
FindAtomA
PurgeComm
ReadFile
OutputDebugStringA
WriteProcessMemory
WideCharToMultiByte
OpenFileMappingA
GetShortPathNameA
GetProfileSectionA
PeekConsoleInputA
GetConsoleCP
ResetEvent
CreateDirectoryExA
DuplicateHandle
GlobalCompact
GetSystemDefaultUILanguage
GlobalUnWire
GetWindowsDirectoryA
LocalReAlloc
SearchPathA
MulDiv
GetLogicalDrives
GetPrivateProfileIntA
CreateFileA
GetModuleHandleA
VirtualProtect
CopyFileExA
ClearCommError
HeapValidate
DosDateTimeToFileTime
GetMailslotInfo
GetCPInfo
VirtualLock
SetEvent
GetConsoleOutputCP
CreateFileMappingA
GetStartupInfoA
msvcrt
rand
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE