Static task
static1
Behavioral task
behavioral1
Sample
aead1d22080742a0da1adee077016b1e0572437fe63d08182663494f68364ca2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aead1d22080742a0da1adee077016b1e0572437fe63d08182663494f68364ca2.exe
Resource
win10v2004-20220812-en
General
-
Target
aead1d22080742a0da1adee077016b1e0572437fe63d08182663494f68364ca2
-
Size
221KB
-
MD5
391c0c06b86bb6d0c2171aa3849cbb64
-
SHA1
77fa7f6fbb0fb514d9c19b1741f89cfba6097984
-
SHA256
aead1d22080742a0da1adee077016b1e0572437fe63d08182663494f68364ca2
-
SHA512
e8f8b3830541ee25b59fa2ae5ecdedebe84a2ea2adf7dfd86bc5423cb251fbd6fd4c8dc2341a5d641be68d646e48b08526186f4879751eb50650a3c55cd1b646
-
SSDEEP
6144:5dXfXPX/Xaroknn6Z8ufSHrRwCWBlpbB69DMp9zRkA5E:3XfXPX/XaroUN
Malware Config
Signatures
Files
-
aead1d22080742a0da1adee077016b1e0572437fe63d08182663494f68364ca2.exe windows x86
8ecadcf69614237b52a502ea04b9a249
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TrackPopupMenu
ShowWindow
SetWindowTextA
SetWindowRgn
UpdateWindow
SetWindowLongA
SetTimer
SetFocus
SetDlgItemTextA
SetClassLongA
SetWindowPos
SetCapture
SendMessageA
ReleaseCapture
RegisterClassExA
RedrawWindow
PtInRect
OffsetRect
MessageBoxA
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsDlgButtonChecked
InvalidateRect
IntersectRect
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetKeyState
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetClientRect
MoveWindow
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetCapture
GetActiveWindow
EndDialog
EnableWindow
DrawTextA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CheckDlgButton
CallWindowProcA
AppendMenuA
kernel32
GlobalUnlock
GlobalLock
FindClose
FindFirstFileA
FlushFileBuffers
WriteFile
CompareStringA
CreateDirectoryA
GlobalAlloc
lstrlenW
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
UnmapViewOfFile
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
MapViewOfFile
MoveFileA
MultiByteToWideChar
RtlMoveMemory
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SizeofResource
Sleep
shell32
ShellExecuteA
gdi32
SetBkColor
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectA
CreateSolidBrush
ExtCreateRegion
GetStockObject
TextOutA
SetTextColor
SetBkMode
AddFontResourceA
SelectObject
RoundRect
RemoveFontResourceA
GetTextExtentPointA
comctl32
InitCommonControls
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ihdoqfh Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE