Static task
static1
Behavioral task
behavioral1
Sample
ae5918df38176deeb2c46e8a27e7bc317649e191a37f4a3d44b62fd278403107.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae5918df38176deeb2c46e8a27e7bc317649e191a37f4a3d44b62fd278403107.exe
Resource
win10v2004-20221111-en
General
-
Target
ae5918df38176deeb2c46e8a27e7bc317649e191a37f4a3d44b62fd278403107
-
Size
355KB
-
MD5
34f7c8a490f2a531c25c5adc9581963f
-
SHA1
638ff57fd84021ca794c8c88ff644e7abfddbc28
-
SHA256
ae5918df38176deeb2c46e8a27e7bc317649e191a37f4a3d44b62fd278403107
-
SHA512
78712a5b396c326a4921919bc190f84719cef2ebd41fd7015a86cf31f28fab16a8aaffd27cf6df035bc64f9b90296bf998d981502f82f1bdefd24b8c49905c57
-
SSDEEP
6144:uhDoZ3fsu8isVVRdB4etHsWDZv8jU2JbcfGxcdbL70ktF/wNJRDQ91LC1s7cO/V+:uFVu8iE/B4etZDZvexeLbwbRcbCC7cO
Malware Config
Signatures
Files
-
ae5918df38176deeb2c46e8a27e7bc317649e191a37f4a3d44b62fd278403107.exe windows x86
655421e6f4e74ddc91c393d3cbd5079a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GlobalFree
CreateFileA
CloseHandle
GetTickCount
FindAtomA
GetLocalTime
GetLastError
lstrlenW
GetComputerNameA
TlsAlloc
SetLastError
GetPrivateProfileIntA
ExitProcess
FindClose
GetStdHandle
MapViewOfFile
GetModuleHandleW
GetFileAttributesW
TlsGetValue
user32
CloseWindow
GetClientRect
DrawStateA
CallWindowProcA
FillRect
GetMenu
CreateWindowExA
GetCaretPos
GetDlgItem
DispatchMessageA
GetClassInfoA
EndDialog
DestroyCaret
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
d3dim
D3DFree
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ