Behavioral task
behavioral1
Sample
aae293e981cdf8ccba5367d0b3688b9e25819fa06490a022adefa78270d5a3ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aae293e981cdf8ccba5367d0b3688b9e25819fa06490a022adefa78270d5a3ec.exe
Resource
win10v2004-20220812-en
General
-
Target
aae293e981cdf8ccba5367d0b3688b9e25819fa06490a022adefa78270d5a3ec
-
Size
49KB
-
MD5
486cb8c5070d3e7a67dc325b0536d1e5
-
SHA1
766d2c61242f31b3f4bda38a617b823333725d18
-
SHA256
aae293e981cdf8ccba5367d0b3688b9e25819fa06490a022adefa78270d5a3ec
-
SHA512
260f68203f3a9d22f7da9025895a130d0c4b6659380b0949514d8b1dcf96305bab0d0d0111469fadb48370ce391e66a6ffc36bf17abc7f809654313987924e2a
-
SSDEEP
1536:tsRqI0LhhAaXge7rghgDxLONt8ZH0GdO/RQal0X:rI0b3XgekhaxLOOUGdOCS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aae293e981cdf8ccba5367d0b3688b9e25819fa06490a022adefa78270d5a3ec.exe windows x86
8492b8b3c4b310f509dd6dff0d4fe091
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
MakeDragList
shell32
StrStrA
user32
DdeInitializeA
CallWindowProcA
Sections
UPX0 Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE