Static task
static1
Behavioral task
behavioral1
Sample
aa8e1ff414bbd4d621f2569f91b87cd6f40ff3a54471a4cbe0d3d208e13661bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa8e1ff414bbd4d621f2569f91b87cd6f40ff3a54471a4cbe0d3d208e13661bf.exe
Resource
win10v2004-20220812-en
General
-
Target
aa8e1ff414bbd4d621f2569f91b87cd6f40ff3a54471a4cbe0d3d208e13661bf
-
Size
19KB
-
MD5
0d5b411452aeaee23204551c8f41df99
-
SHA1
e76ca7903353cfbf662b667c01131e9d840038de
-
SHA256
aa8e1ff414bbd4d621f2569f91b87cd6f40ff3a54471a4cbe0d3d208e13661bf
-
SHA512
05ab4953a436298663b5557564811db0478d7832921e617a21608b8ae5d4802d6e6b72ed24b06fe7b6844085e448e862ddfabb1d538e424510c525ba41a3eded
-
SSDEEP
384:zhel1dQ77YElZEofODtWVijc3TD7ZiyMXlVWmL0K/V00BCLNiYm2nmbyF6H:L7YEHVfQtNjcD0fXlVWmLj6MCLgxOwyc
Malware Config
Signatures
Files
-
aa8e1ff414bbd4d621f2569f91b87cd6f40ff3a54471a4cbe0d3d208e13661bf.exe windows x86
855f6373b7aba910869c9efb7fd75edf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateMutexA
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
GetFileSize
GetFileTime
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
MoveFileA
MoveFileExA
MultiByteToWideChar
ReadFile
SetCurrentDirectoryA
SetFilePointer
SetFileTime
Sleep
VirtualAlloc
WinExec
WriteFile
user32
PeekMessageA
wsprintfA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
imagehlp
CheckSumMappedFile
ImageLoad
ImageUnload
iphlpapi
GetAdaptersInfo
ntdll
ZwQuerySystemInformation
sfc
ord5
Sections
.flat Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ