Static task
static1
Behavioral task
behavioral1
Sample
aaba7258a3dd3d61851b8fbaeba4e8fcb50764a6c52ff7d4d50660023d517d34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aaba7258a3dd3d61851b8fbaeba4e8fcb50764a6c52ff7d4d50660023d517d34.exe
Resource
win10v2004-20221111-en
General
-
Target
aaba7258a3dd3d61851b8fbaeba4e8fcb50764a6c52ff7d4d50660023d517d34
-
Size
68KB
-
MD5
ec72765f2aaafb9f82351702a2d1581e
-
SHA1
9081eee2612acfbb5989c6fc6f32adcea4cc2e49
-
SHA256
aaba7258a3dd3d61851b8fbaeba4e8fcb50764a6c52ff7d4d50660023d517d34
-
SHA512
d70388ff93a51de0f26163ef62a6a71444d4a9af746cd13a11e1f09bfaa1fcb9ed751b48d97f6fed0d6b77de05d6d86315653b9dbd2e5d76dac41652b5323fe0
-
SSDEEP
1536:bVOI2MT0Z/YUNeuaoVMpxRc8sKhmH7CBolDRLa:kI2MIR0cMG8s77TlDA
Malware Config
Signatures
Files
-
aaba7258a3dd3d61851b8fbaeba4e8fcb50764a6c52ff7d4d50660023d517d34.exe windows x86
785a06d8911fce44521923d214221e1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
WriteFile
GetCurrentProcessId
GetLastError
CreateMutexA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
MoveFileA
GetFileAttributesA
FreeLibrary
CopyFileA
CreateProcessA
CreateDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
ExitProcess
GetTempPathA
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleA
GetCurrentProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
OpenProcess
VirtualAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetFilePointer
HeapSize
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
VirtualQuery
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
RtlUnwind
InterlockedExchange
SetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
FlushFileBuffers
TerminateProcess
Sleep
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
WideCharToMultiByte
LoadLibraryA
VirtualFree
GetProcAddress
advapi32
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegEnumValueA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE