Static task
static1
Behavioral task
behavioral1
Sample
43f7b2c55930c936517ea7ce99556443b50369a97eb1d0f30f20ccf1cb599e10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43f7b2c55930c936517ea7ce99556443b50369a97eb1d0f30f20ccf1cb599e10.exe
Resource
win10v2004-20220901-en
General
-
Target
43f7b2c55930c936517ea7ce99556443b50369a97eb1d0f30f20ccf1cb599e10
-
Size
627KB
-
MD5
6528ca50ea45e7b04b3f19099b21467b
-
SHA1
d53dfd4b225a99e17332a1dda4fae758b865fabd
-
SHA256
43f7b2c55930c936517ea7ce99556443b50369a97eb1d0f30f20ccf1cb599e10
-
SHA512
1cd2f36af9077da9932504dafd86e964d572c9aedf92e1897dd8511bcab4522210b3041c95df43aa50a198a36dca1766105c278d8d057aec3477d53413935eef
-
SSDEEP
12288:RWlDPlaA/v5Lze6Z02L7lN2/07qCAEC6+sPZ/AhFv:RWlDP1X5HL22W/8qCvX+sahV
Malware Config
Signatures
Files
-
43f7b2c55930c936517ea7ce99556443b50369a97eb1d0f30f20ccf1cb599e10.exe windows x86
5e4cb15aa3df8da982ed18ac40068dec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtCreateKey
NtOpenProcessToken
NtCreateFile
NtClose
NtAdjustPrivilegesToken
NtDeleteFile
NtWriteFile
RtlInitUnicodeString
NtSetSecurityObject
NtTerminateProcess
NtSetValueKey
NtQuerySecurityObject
NtReadFile
RtlQueryEnvironmentVariable_U
NtQueryInformationToken
RtlUnwind
wcscpy
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mdata Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ