Static task
static1
Behavioral task
behavioral1
Sample
41ae2870a6114fd7446b4c829848f8e1a69b055625ec5365b3eb3a683b18181d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41ae2870a6114fd7446b4c829848f8e1a69b055625ec5365b3eb3a683b18181d.exe
Resource
win10v2004-20220812-en
General
-
Target
41ae2870a6114fd7446b4c829848f8e1a69b055625ec5365b3eb3a683b18181d
-
Size
12KB
-
MD5
3a020f392bbbddb484d2d5e052bc42aa
-
SHA1
8b49214a2181d80ec8decb14f6ebc295ab38c6ae
-
SHA256
41ae2870a6114fd7446b4c829848f8e1a69b055625ec5365b3eb3a683b18181d
-
SHA512
7f3bb37faa302a1ba5b94994cdca4fe32320b7e4b4526c3fbad91be172b523e7e72dd69dfc77ef5d3c7126d7db68285eaa064c1c88cd485c914998eafed183e7
-
SSDEEP
192:q+fhhZo3NvnSlkj6rzMGs2Klb0CPZ10fPVY68IRWCOmrZ11DM5PVDCwLRo+/v:5ISmgMKKrqbbDYDCwLRo+v
Malware Config
Signatures
Files
-
41ae2870a6114fd7446b4c829848f8e1a69b055625ec5365b3eb3a683b18181d.exe windows x86
0fc7362557766ad65951d63be8f084a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
LoadLibraryA
FreeLibrary
DeleteFileA
GetCurrentProcess
PulseEvent
GetModuleHandleW
GetProcAddress
CloseHandle
ExitProcess
ReadFile
GetModuleHandleA
WriteFile
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
lstrcatA
lstrcpyA
CreateFileA
GetFileAttributesA
GetTempPathA
TerminateProcess
CompareStringA
Process32First
CreateToolhelp32Snapshot
RtlUnwind
InterlockedExchange
VirtualQuery
VirtualAlloc
HeapReAlloc
user32
wsprintfA
CharToOemA
MessageBoxA
ExitWindowsEx
GetParent
ShowWindow
AnyPopup
advapi32
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE