Static task
static1
Behavioral task
behavioral1
Sample
fad9716e2fa431948caa844335025d32c94db42f76a5b18a471829dc2ff291ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fad9716e2fa431948caa844335025d32c94db42f76a5b18a471829dc2ff291ac.exe
Resource
win10v2004-20220812-en
General
-
Target
fad9716e2fa431948caa844335025d32c94db42f76a5b18a471829dc2ff291ac
-
Size
138KB
-
MD5
5d940b3a9e94f8065654264167b6359f
-
SHA1
9288232caaf7beca8536988dfec1f46132ee12fb
-
SHA256
fad9716e2fa431948caa844335025d32c94db42f76a5b18a471829dc2ff291ac
-
SHA512
80ca7a7f77759bb6631c65e50ecdc2f1e6447dc387421dc580a8a5d7a850cc0ae83be673265cafc84424aafea2c7f91c7ff2f81dfb9f5b4612efb4b8031b6081
-
SSDEEP
3072:6QxCBQ2csiGCN08p97tVSyZVfPBaSubHNjceRtcNfO:6QdgQ7p5TSyDffubeWt7
Malware Config
Signatures
Files
-
fad9716e2fa431948caa844335025d32c94db42f76a5b18a471829dc2ff291ac.exe windows x86
d495dd7fc1b7bccb032f3632acb7c9eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
HeapCreate
ResetEvent
GetModuleHandleA
LocalFree
GetCommandLineW
CreateThread
SetLastError
CloseHandle
GetTickCount
GetComputerNameA
CreateFileA
GetExitCodeProcess
GetFileAttributesA
LoadLibraryW
SetEvent
GetDiskFreeSpaceW
SuspendThread
TlsGetValue
FindAtomA
advapi32
RegEnumValueA
GetFileSecurityA
RegCreateKeyExA
CreateServiceW
RegQueryValueA
RegCloseKey
GetUserNameW
GetLengthSid
CredFree
RegEnumKeyExA
RegDeleteKeyA
IsTokenRestricted
CloseEventLog
cryptui
WizardFree
CryptUIDlgCertMgr
CryptUIDlgSelectStoreA
CryptUIDlgSelectCA
LocalEnroll
powercfg.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ