Static task
static1
Behavioral task
behavioral1
Sample
aaf697f70e9aa6c350ee3264ffc4b71e1ac8707f56804bf572ad03b55ee74170.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aaf697f70e9aa6c350ee3264ffc4b71e1ac8707f56804bf572ad03b55ee74170.exe
Resource
win10v2004-20220812-en
General
-
Target
aaf697f70e9aa6c350ee3264ffc4b71e1ac8707f56804bf572ad03b55ee74170
-
Size
751KB
-
MD5
fe20a3c27aaadd46d8a6c99dc999df86
-
SHA1
06dd1a7906bf6aa12586d8663e08d364dadedaf3
-
SHA256
aaf697f70e9aa6c350ee3264ffc4b71e1ac8707f56804bf572ad03b55ee74170
-
SHA512
a9951142e5dd8952f21505802d55ac72f7b7d09fb146494eff2b209c7287955c0667c49e9cbe4552d4aad866c5c41153bc60efb094ce293dc7d1273e5057dd52
-
SSDEEP
12288:YOF2jpde3U8PTf7WVE74V7dmgSWYf5DAxZ4fdVyKYO1K/PBneFkUdnpEuZxuW+:YOF2jpo3BnWpdmD5bdWO1K3zUlpTQB
Malware Config
Signatures
Files
-
aaf697f70e9aa6c350ee3264ffc4b71e1ac8707f56804bf572ad03b55ee74170.exe windows x86
c0398416f7663f3da28648eb361f025e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
GetEnvironmentVariableW
HeapSize
CreateFileA
ReleaseMutex
ResetEvent
WriteConsoleA
DeleteFileW
OpenProcess
RemoveDirectoryA
GetCommandLineW
GetStartupInfoA
SetLastError
GetModuleHandleA
CreateMutexA
SetConsoleCP
GetTickCount
GetFileAttributesA
SetEvent
ExitProcess
ClearCommBreak
user32
FindWindowA
GetCaretPos
PeekMessageA
GetDC
CallWindowProcW
GetClassInfoA
GetSysColor
GetCursorInfo
DispatchMessageW
GetDC
GetDC
GetWindowLongA
DispatchMessageW
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 745KB - Virtual size: 745KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ