Static task
static1
Behavioral task
behavioral1
Sample
aec09be0c8294fb548ca13dabad3a897e27bc17e6898b0783447b19b714ff8cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aec09be0c8294fb548ca13dabad3a897e27bc17e6898b0783447b19b714ff8cf.exe
Resource
win10v2004-20220901-en
General
-
Target
aec09be0c8294fb548ca13dabad3a897e27bc17e6898b0783447b19b714ff8cf
-
Size
307KB
-
MD5
abdcc2c2bd13b9c5eba5d28481f4aa9e
-
SHA1
7506eb493c8d49b15126b84003cf715798a29c93
-
SHA256
aec09be0c8294fb548ca13dabad3a897e27bc17e6898b0783447b19b714ff8cf
-
SHA512
f13d70dfe9cd23d9809dcb82138f4ec66c2bfe36a9cb8b01fcb37dc99c87f2c05a024055805f42ac07c7e1de06e5913f556f9fbaf9e0175e23d7870cd90abfe4
-
SSDEEP
6144:qpkttZFEAa9hKnvTol0rZAuRtcbjqCGvmdR0SxuN1QPtNrPF2M7SUgujT:qpkZFE5Qvbasq6v+US0N1ctNbFb7Xp
Malware Config
Signatures
Files
-
aec09be0c8294fb548ca13dabad3a897e27bc17e6898b0783447b19b714ff8cf.exe windows x86
1e7865165439a1ede105f6182daeaa6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
ReleaseMutex
lstrcmpW
GetDriveTypeA
SetLastError
CloseHandle
SetEvent
ResetEvent
CreateFileA
FindAtomW
HeapCreate
LoadLibraryA
GetDiskFreeSpaceW
CreateThread
GetComputerNameA
LocalFree
GetFileAttributesW
GetSystemTime
GetCommandLineW
GetModuleHandleA
user32
GetClassInfoA
CallWindowProcA
GetClipCursor
CreateWindowExA
DestroyCaret
GetDlgItem
GetKeyState
FillRect
DispatchMessageA
GetComboBoxInfo
CloseWindow
SetFocus
DrawStateA
cryptdll
CDLocateRng
MD5Init
CDBuildVect
CDRegisterRng
MD5Final
desk.cpl
DisplaySaveSettings
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ