Static task
static1
Behavioral task
behavioral1
Sample
470c09f5a39b1d268e2e11467a29cab81bff9a261559ed7bb043380c84523cba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
470c09f5a39b1d268e2e11467a29cab81bff9a261559ed7bb043380c84523cba.exe
Resource
win10v2004-20220812-en
General
-
Target
470c09f5a39b1d268e2e11467a29cab81bff9a261559ed7bb043380c84523cba
-
Size
35KB
-
MD5
02867658871814242261bb73d26a0d60
-
SHA1
658ec87583c784db5775c78723b9db46b58aad53
-
SHA256
470c09f5a39b1d268e2e11467a29cab81bff9a261559ed7bb043380c84523cba
-
SHA512
e604c35a49f57a3e53c36365718bc694c17269e156b60923af102a37a9fae19fd93e953e44e2dfd5ead99e31bd860387f67e7e80865c3462c87bebe88473ce3f
-
SSDEEP
768:WBK7SfWnUNA9F8yPYViDnplB4UTd0QicylPiV7BfGcBVG:4+SfWUNUF8GiiDnplr6PcYP+TG
Malware Config
Signatures
Files
-
470c09f5a39b1d268e2e11467a29cab81bff9a261559ed7bb043380c84523cba.exe windows x86
c6252fccf829b9d03821f28adaf32c75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_except_handler3
_initterm
__getmainargs
__initenv
exit
_write
_cexit
_XcptFilter
__setusermatherr
_exit
_c_exit
advapi32
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
GetUserNameA
RegCloseKey
kernel32
GetTickCount
FormatMessageA
LocalFree
GetComputerNameA
GetFileSize
_lclose
GetModuleHandleA
OpenFile
_lread
lprhelp
WriteJobData
StartJob
InitiateConnection
CloseLPR
CancelJob
OpenLPR
EndJob
user32
CharToOemBuffA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gqktvdz Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE