Static task
static1
Behavioral task
behavioral1
Sample
aa6e36b0049c8fae2b59921c91103b80f468c42a5f5503bbc08d079f91052d9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa6e36b0049c8fae2b59921c91103b80f468c42a5f5503bbc08d079f91052d9b.exe
Resource
win10v2004-20220812-en
General
-
Target
aa6e36b0049c8fae2b59921c91103b80f468c42a5f5503bbc08d079f91052d9b
-
Size
9KB
-
MD5
43acb78c364c9e294b5399fe98e29d4c
-
SHA1
699162d83120a10bad8f0a54ae93a8c545122853
-
SHA256
aa6e36b0049c8fae2b59921c91103b80f468c42a5f5503bbc08d079f91052d9b
-
SHA512
68c7353031b0e3ddb15d757a1697b1701d569bbae22aa33318f6822cd7fa01bc5a0e923c1a50719af6666e510adec6d01729d46d8bc398cd8a8b75953bf0bf08
-
SSDEEP
192:lGO+Zbcw9+z8w50rXfPEFDx4vZekAt8ue:YO+Zbjkz8w50rXfPEyZekAt8u
Malware Config
Signatures
Files
-
aa6e36b0049c8fae2b59921c91103b80f468c42a5f5503bbc08d079f91052d9b.exe windows x86
00f1e91c21530aca79644a822a098794
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
WriteFile
GetLastError
CloseHandle
CreateFileA
CreateFileMappingA
CreateThread
ExitProcess
GetCurrentProcess
lstrlenA
lstrcpyA
lstrcatA
GetModuleFileNameA
UnmapViewOfFile
Sleep
ReadFile
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryA
GlobalFree
GlobalAlloc
GetProcAddress
GetFileSize
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
advapi32
RegOpenKeyA
LookupPrivilegeValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegCloseKey
OpenProcessToken
shlwapi
StrStrIA
wsock32
socket
shutdown
send
select
recv
listen
htons
htonl
getsockname
gethostname
gethostbyname
connect
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSACleanup
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE