Static task
static1
Behavioral task
behavioral1
Sample
4fea547bfd83579e9332d2261ef5558ae5941c148e1dc8f0652eb4929d83f0b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fea547bfd83579e9332d2261ef5558ae5941c148e1dc8f0652eb4929d83f0b2.exe
Resource
win10v2004-20220812-en
General
-
Target
4fea547bfd83579e9332d2261ef5558ae5941c148e1dc8f0652eb4929d83f0b2
-
Size
168KB
-
MD5
e667383f00e077a1a925f577a038d810
-
SHA1
1f98de0b645ab3d085705894954168a2e44c72bd
-
SHA256
4fea547bfd83579e9332d2261ef5558ae5941c148e1dc8f0652eb4929d83f0b2
-
SHA512
b8d0c3a94444032dbac403d7054317610134ad439599bd4da4cc4bb20da7c96f5f6ed883ff9aca13df3607f31ab6ab51300a5b3f55adfb56f913cf2b32987982
-
SSDEEP
3072:ui/J4ihD3HJo50/987EH1IZGJx426EdBx:/+Wj0v7EVIgxL
Malware Config
Signatures
Files
-
4fea547bfd83579e9332d2261ef5558ae5941c148e1dc8f0652eb4929d83f0b2.exe windows x86
91b2790c505bbe69e215e722d884b1b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
crtdll
sprintf
kernel32
CreateProcessA
GlobalAddAtomA
GlobalFindAtomA
GetVersion
GetTempPathA
GetTickCount
ExitProcess
GetModuleFileNameA
CopyFileA
Sleep
CloseHandle
GetModuleHandleA
GetCurrentProcess
CreateFileA
ReadFile
SetFilePointer
WriteFile
GetFileSize
GlobalAlloc
DeleteFileA
user32
ExitWindowsEx
shell32
ShellExecuteA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ExeSax Size: 75B - Virtual size: 75B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE