Static task
static1
Behavioral task
behavioral1
Sample
aa2c7d61afcc32140d9bcd10a130e153f7c765a8e53dc8dccc7377cdd855b481.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa2c7d61afcc32140d9bcd10a130e153f7c765a8e53dc8dccc7377cdd855b481.exe
Resource
win10v2004-20221111-en
General
-
Target
aa2c7d61afcc32140d9bcd10a130e153f7c765a8e53dc8dccc7377cdd855b481
-
Size
90KB
-
MD5
6c9a93b70e691af41f1ef21efd78b5aa
-
SHA1
12b78587123c964f51e25992f031c8c8c2996565
-
SHA256
aa2c7d61afcc32140d9bcd10a130e153f7c765a8e53dc8dccc7377cdd855b481
-
SHA512
bc2e89fdf4b298bf36d20207d69605d2f337600b00633ca3483a97d55d0782dcfa48300f4e26f1029933c7cb0b6e488d05a09b55adb8e14df2e570a24fd66073
-
SSDEEP
1536:lfE7X9D8sMMOPAoKu/aY14LxMQLXRZqapB4hiApSFuS:lcz90pPAoK6XG9Z3B4hZ4AS
Malware Config
Signatures
Files
-
aa2c7d61afcc32140d9bcd10a130e153f7c765a8e53dc8dccc7377cdd855b481.exe windows x86
c6c8f9a2cdd71e1c6c79ef1d131b23b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CreateProcessA
HeapCreate
GetCurrentDirectoryA
SetLastError
FindResourceW
LocalFree
CreateFileW
UnmapViewOfFile
GetComputerNameA
GetModuleHandleA
Sleep
CloseHandle
lstrcpyA
GetCurrentThreadId
GlobalUnlock
lstrlenA
LoadLibraryExW
FindClose
PulseEvent
user32
IsWindow
GetDlgItem
DrawEdge
GetDC
FillRect
GetCaretPos
CreateWindowExA
CallWindowProcA
CheckRadioButton
SetFocus
DispatchMessageA
DrawMenuBar
CreateIcon
rsaenh
CPGenKey
CPDecrypt
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE