Static task
static1
Behavioral task
behavioral1
Sample
aa3d5ab630323f95d26cf30a439d80d0ffa4e5afaa2682258bdafa745ea2a4d1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa3d5ab630323f95d26cf30a439d80d0ffa4e5afaa2682258bdafa745ea2a4d1.exe
Resource
win10v2004-20220812-en
General
-
Target
aa3d5ab630323f95d26cf30a439d80d0ffa4e5afaa2682258bdafa745ea2a4d1
-
Size
88KB
-
MD5
0df91543c6be0b32cca315c977a0d0e4
-
SHA1
3548a1081bda110819ee710ba79192086183f53e
-
SHA256
aa3d5ab630323f95d26cf30a439d80d0ffa4e5afaa2682258bdafa745ea2a4d1
-
SHA512
bca9a02c8ec17c92d31d728b0543f00f6278575ca831ea8e8f55e8324730f5b69f8ae8ce6a8638ec3fe62530dc63b124e1635cef09d6a310748cfadbc1bc9708
-
SSDEEP
1536:qzk+lUFl01sLz35oXXpPmBwgPHahDrLt+yNH1:qzkWUFK143SXW9PHItB1
Malware Config
Signatures
Files
-
aa3d5ab630323f95d26cf30a439d80d0ffa4e5afaa2682258bdafa745ea2a4d1.exe windows x86
12b0de57187182b96403d03c701e14c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetTickCount
GetCommandLineA
IsBadCodePtr
FindClose
EnumResourceTypesA
GetDiskFreeSpaceExW
GetModuleHandleA
LoadLibraryExA
GetDriveTypeA
FreeConsole
Sleep
IsBadReadPtr
DeleteCriticalSection
SetLastError
GetLastError
VirtualProtect
ReleaseMutex
TlsGetValue
CloseHandle
shell32
ShellMessageBoxA
DuplicateIcon
SHGetSettings
StrChrA
DllUnregisterServer
DragFinish
ExtractIconA
SHGetMalloc
DragAcceptFiles
SHGetDiskFreeSpaceA
DragQueryFileA
ShellAboutA
SHFree
printui
vQueueCreate
bPrinterSetup
PnPInterface
bFolderGetPrinter
vPrinterPropPages
advapi32
RegCloseKey
Sections
.text Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE