Static task
static1
Behavioral task
behavioral1
Sample
a06ae93c830ef71c823af25a8ee652edb6cf48e84258385e93f0470debb6d364.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a06ae93c830ef71c823af25a8ee652edb6cf48e84258385e93f0470debb6d364.exe
Resource
win10v2004-20220812-en
General
-
Target
a06ae93c830ef71c823af25a8ee652edb6cf48e84258385e93f0470debb6d364
-
Size
24KB
-
MD5
7a3b8182748fb27354f791181ab16283
-
SHA1
4ddce24b92beeafbe9c61d4859cffc2ed3f3f88d
-
SHA256
a06ae93c830ef71c823af25a8ee652edb6cf48e84258385e93f0470debb6d364
-
SHA512
77c5772c2ebb28df2190d518178bc25667e9b9b6c1c20a108df87b6d5915172ff82a6b1f5165c1a5fdafc78cac4b67610f52359de502f2b9f209cb676374db84
-
SSDEEP
192:h9a3wlRlKyTUoynbLUN++igY8MReXVlwqMtPukgUw99Tx:hIAZKy4VLUjYglfMtpI
Malware Config
Signatures
Files
-
a06ae93c830ef71c823af25a8ee652edb6cf48e84258385e93f0470debb6d364.exe windows x86
fb29bc5f97dfcece7624329b01e5fd7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
sprintf
exit
kernel32
WriteFile
GetStartupInfoA
GetModuleHandleA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetTempPathA
SetCurrentDirectoryA
FindResourceA
GetProcAddress
LoadLibraryA
Sleep
GetSystemDirectoryA
FreeResource
CloseHandle
LockResource
GetFileSize
CreateFileA
SizeofResource
LoadResource
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ