Static task
static1
Behavioral task
behavioral1
Sample
5011e74a222748d9d332cd054dbceebd304e8bd13a273a15318d78e17f98d7e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5011e74a222748d9d332cd054dbceebd304e8bd13a273a15318d78e17f98d7e1.exe
Resource
win10v2004-20220812-en
General
-
Target
5011e74a222748d9d332cd054dbceebd304e8bd13a273a15318d78e17f98d7e1
-
Size
747KB
-
MD5
0106bb879a5075c9c4dc4b73f56c26e5
-
SHA1
e941dba72d140f12d32a679f41abb5592e2870fc
-
SHA256
5011e74a222748d9d332cd054dbceebd304e8bd13a273a15318d78e17f98d7e1
-
SHA512
79b2c9c69f359fd1f09b7cab26579c5e3179627113655de1aeea8de682e90b48f193d0ed5b0bc4b3ceb609837e2c0c97d7d291b3061a5ffacabf728a9119a0e4
-
SSDEEP
12288:RlHzEUZKrGCXbScuqOYSHtbdZjp8OepYR0lOG6GgNzcoCbKSyX2X7Oq:PE0Krmq3SHJzFHeqR0lOG6GgqCz2XCq
Malware Config
Signatures
Files
-
5011e74a222748d9d332cd054dbceebd304e8bd13a273a15318d78e17f98d7e1.exe windows x86
d63bb595853dce9cdfadc0b00920ca86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceTypesA
WriteConsoleA
CreateSemaphoreA
CloseHandle
GetFileAttributesW
HeapDestroy
lstrlenA
SetLastError
GetStartupInfoA
GetCommandLineA
GetConsoleTitleW
GetCommandLineA
GetEnvironmentVariableA
GetModuleHandleA
CreateEventW
HeapCreate
GlobalFlags
CloseHandle
DeleteFileA
GetDriveTypeW
advapi32
RegEnumKeyA
RegDeleteValueA
CloseEventLog
IsValidSid
IsValidSid
RegQueryValueW
IsValidAcl
RegCreateKeyExW
IsValidSid
IsValidSid
IsValidSid
InitializeSid
CreateProcessAsUserW
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ