Static task
static1
Behavioral task
behavioral1
Sample
runelevated.exe
Resource
win10v2004-20220812-en
General
-
Target
runelevated.exe
-
Size
15KB
-
MD5
875f91c52acf25570ebeb3c285298148
-
SHA1
0e3756d152a76e46c8acf3b2e64d7564d597e470
-
SHA256
c38766231dfd2e44777215bdfa1ad362262cd0ada49d418438eba4e26e9da1ea
-
SHA512
72772daeb09e1913e89cc8c405ea4a45825896c8031ecebef869531141f1fd20267a4bac7b8ab06d86bf409f8caa1960b95931e37226b954927b48ccecb41923
-
SSDEEP
192:6ZjfBMoQZXZ+9kMTcWdzOqSOj+Gloxkxklmz+hvznLjNPCHVCKTM45ndMOLLhZoY:6oo64CMTJZkG0wbgbXRC1CKT9niOH5YC
Malware Config
Signatures
Files
-
runelevated.exe.exe windows x86
f29513fbc203adbd5500c251518155df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
QueryPerformanceCounter
shell32
ShellExecuteExW
ole32
CoInitializeEx
msvcr80
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_initterm
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
__wargv
__argc
_encode_pointer
memset
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ