Static task
static1
Behavioral task
behavioral1
Sample
475905fc53f48b316aaefe86caf35bedafb3a0d44686fa99d2fb79c1799f2301.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
475905fc53f48b316aaefe86caf35bedafb3a0d44686fa99d2fb79c1799f2301.exe
Resource
win10v2004-20220812-en
General
-
Target
475905fc53f48b316aaefe86caf35bedafb3a0d44686fa99d2fb79c1799f2301
-
Size
53KB
-
MD5
09089957dd242db8af469fe7370c2642
-
SHA1
c41ce1f5f5dd324d5b7414d75a2bf13489428e25
-
SHA256
475905fc53f48b316aaefe86caf35bedafb3a0d44686fa99d2fb79c1799f2301
-
SHA512
37f9e4cbbec9406d0b2baf04565f221b67f52f29f1f354fa61560a4b8052f06c72bb37f8447c3f562714c3b422c2bd7daa97cdb19a00bd84f314b6be4558db3a
-
SSDEEP
768:uih9hkn/u/bV3TBFcH7MwZGQhrbp930NScD05s2l9QRmTQOl3S81B+hC1epielHc:Thb9YH7murdkY5s2l58AnBEpieZmVr
Malware Config
Signatures
Files
-
475905fc53f48b316aaefe86caf35bedafb3a0d44686fa99d2fb79c1799f2301.exe windows x86
49f358585610ebab9a1445c300f41320
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetDriveTypeW
HeapDestroy
HeapCreate
GetConsoleTitleA
DeleteFileA
GetStartupInfoA
GlobalFlags
CloseHandle
GetCommandLineA
GetCommandLineA
GetEnvironmentVariableA
lstrlenA
EnumResourceTypesA
SetLastError
GetModuleHandleA
GetTimeFormatW
CreateEventW
WriteConsoleA
GetFileAttributesW
advapi32
IsValidAcl
IsValidSid
IsValidSid
RegQueryValueW
RegEnumKeyA
RegDeleteValueA
IsValidSid
RegCreateKeyExW
IsValidSecurityDescriptor
IsValidSid
InitializeSid
IsValidSid
CreateProcessAsUserW
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE