Static task
static1
Behavioral task
behavioral1
Sample
fcedbcca9f02fcf023be667bc3623c88d69b64143d81eea473fb06c05490f529.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fcedbcca9f02fcf023be667bc3623c88d69b64143d81eea473fb06c05490f529.exe
Resource
win10v2004-20220812-en
General
-
Target
fcedbcca9f02fcf023be667bc3623c88d69b64143d81eea473fb06c05490f529
-
Size
444KB
-
MD5
3352c70aba253056aa6bad9f9f55efb9
-
SHA1
1f57e4572af67c80077b86a100361aaa30d399b6
-
SHA256
fcedbcca9f02fcf023be667bc3623c88d69b64143d81eea473fb06c05490f529
-
SHA512
854bca3bed25ef4cfa6020867df1aa4e183a13ad49c7598ae24ff4e5e0f12efd5a3044e28259635ce28a0baff1c0961da633480655d030d9e39e804da412fccf
-
SSDEEP
12288:rRq2c6/b2j7Pzu1nlPUfngo1vbSAuaTFA7E2W:AE/yj7LCl2uaJ0E2
Malware Config
Signatures
Files
-
fcedbcca9f02fcf023be667bc3623c88d69b64143d81eea473fb06c05490f529.exe windows x86
bd83147f6d5038db7d6ede6444f11a79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GlobalFlags
GetDriveTypeW
GetEnvironmentVariableA
lstrlenA
HeapDestroy
HeapCreate
EnumResourceTypesA
GetCommandLineA
SetLastError
CreateEventW
GetFileAttributesA
GetTimeFormatW
TlsGetValue
GetModuleHandleA
CloseHandle
GetConsoleTitleA
VirtualQuery
CloseHandle
GetStartupInfoA
advapi32
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExW
IsValidSid
RegQueryValueW
InitializeSid
IsValidSid
CreateProcessAsUserA
IsValidSid
IsValidSid
IsValidAcl
IsValidSecurityDescriptor
IsValidSid
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 612KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 438KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ