Static task
static1
Behavioral task
behavioral1
Sample
aee29b83bf095071a8b3024896d614ce6d59a981d458cd23f341c2fc9814296d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aee29b83bf095071a8b3024896d614ce6d59a981d458cd23f341c2fc9814296d.exe
Resource
win10v2004-20220812-en
General
-
Target
aee29b83bf095071a8b3024896d614ce6d59a981d458cd23f341c2fc9814296d
-
Size
808KB
-
MD5
bd3848a8f780284f4ac0b94e5fd03e75
-
SHA1
7792ec2f703574c6242476d150e8a826cbee62d0
-
SHA256
aee29b83bf095071a8b3024896d614ce6d59a981d458cd23f341c2fc9814296d
-
SHA512
b4efbfd960bbd8f7cf658c655ff5d9529050728fb70084558dd1c6498f6a4d662c1ba0c6bf61335c59d47dfb81743f21f937189a22cf9b200603c79491bf7b1f
-
SSDEEP
12288:OViYcBGZbpekT9zfyIl2yhoBB+cOxgO0KtEw1tg7wPJz7KYgGT4saEJ2OYC0cv7:OoYcBq5z9CBfnAEo3KYgcaEJ2Oe+7
Malware Config
Signatures
Files
-
aee29b83bf095071a8b3024896d614ce6d59a981d458cd23f341c2fc9814296d.exe windows x86
9548d832f6e28b06c96f9432c44fad75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
CreateThread
LocalSize
GetProcessHeap
ResetEvent
FindVolumeClose
CreateFileW
lstrlenA
GetMailslotInfo
VirtualAlloc
CloseHandle
ReleaseMutex
GetDriveTypeA
ReadFile
GetExitCodeProcess
GetModuleHandleW
GetLocalTime
FreeConsole
LocalFree
GlobalFree
user32
GetClassInfoA
GetClientRect
GetSysColor
DispatchMessageA
GetCursorInfo
GetDlgItem
GetKeyState
CallWindowProcA
SetFocus
CreateWindowExA
GetMenu
EndDialog
DrawStateW
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
desk.cpl
InstallScreenSaverA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 798KB - Virtual size: 798KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ