Static task
static1
Behavioral task
behavioral1
Sample
1e6508eae1252d0e8bd6adc2f3a5118f27722678ad864799de934d637ed2b9e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e6508eae1252d0e8bd6adc2f3a5118f27722678ad864799de934d637ed2b9e9.exe
Resource
win10v2004-20220812-en
General
-
Target
1e6508eae1252d0e8bd6adc2f3a5118f27722678ad864799de934d637ed2b9e9
-
Size
173KB
-
MD5
044f7284fa92482f5a33f6433ff8a93c
-
SHA1
01a15f416f93da2e087f458febfada79ab544f15
-
SHA256
1e6508eae1252d0e8bd6adc2f3a5118f27722678ad864799de934d637ed2b9e9
-
SHA512
9e6ef8a0ecc1621da052d4b068d5816a6af031ef4d344e934b98005b921058c7df464bc1f3394fe87650cf7e6d19d350488d4fc31655d7899c2ab850d4018af9
-
SSDEEP
3072:trMVzEMLA/ARTM7LPbQN68sAizyDqtbAKZLGqpCIO9lwKlW/I0CuchQG8r:trMWM+AFM7LPSYAqGCphGeM9fW/h5chE
Malware Config
Signatures
Files
-
1e6508eae1252d0e8bd6adc2f3a5118f27722678ad864799de934d637ed2b9e9.exe windows x86
df6f46621cbbd6593009b0242f002278
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExA
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ