Static task
static1
Behavioral task
behavioral1
Sample
a1d1aaea8085dce51f63d4be73e2762f461e6b36ebeba7bd47297c9520c418e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1d1aaea8085dce51f63d4be73e2762f461e6b36ebeba7bd47297c9520c418e4.exe
Resource
win10v2004-20220812-en
General
-
Target
a1d1aaea8085dce51f63d4be73e2762f461e6b36ebeba7bd47297c9520c418e4
-
Size
68KB
-
MD5
327d946c7fa92d74fd242488e9dfe311
-
SHA1
9c3ab78ad39bb6ce368fba7ba431959476b30814
-
SHA256
a1d1aaea8085dce51f63d4be73e2762f461e6b36ebeba7bd47297c9520c418e4
-
SHA512
ed55347d1b31cf8ca07fbff96670da56955578b289f02ac27a7d74dd3f207b77e0ee39463f890ed2759efd4627af46199b0da9d9278205018a191cc465e546dd
-
SSDEEP
1536:Cm3CKzB575Laq1lV9vjza3I/0CdJTQrBoke:Cl250sbvldJi+ke
Malware Config
Signatures
Files
-
a1d1aaea8085dce51f63d4be73e2762f461e6b36ebeba7bd47297c9520c418e4.exe windows x86
e6535ae5e31a6fad5e14ad93130df8bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindClose
TlsGetValue
GetTickCount
CloseHandle
GetCommandLineA
GetComputerNameA
Sleep
GetLastError
GetExitCodeProcess
GetModuleHandleA
SearchPathA
GetDriveTypeA
CreateSemaphoreA
GetModuleFileNameA
DeleteCriticalSection
SetLastError
CreateMutexA
VirtualProtect
FreeConsole
shell32
SHGetMalloc
DragAcceptFiles
StrChrA
ShellAboutA
ShellMessageBoxA
DragQueryPoint
SHGetDiskFreeSpaceA
DragQueryFileA
SHFree
SHAlloc
DragFinish
SheChangeDirA
SHGetSettings
SHGetNewLinkInfo
mgmtapi
SnmpMgrRequest
SnmpMgrClose
SnmpMgrOpen
SnmpMgrGetTrap
SnmpMgrCtl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ