Static task
static1
Behavioral task
behavioral1
Sample
7dae598a9f26184f55f0ad2c8ba3d057ed199fd1442a552decf2beafef3b7d24.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7dae598a9f26184f55f0ad2c8ba3d057ed199fd1442a552decf2beafef3b7d24.exe
Resource
win10v2004-20220812-en
General
-
Target
7dae598a9f26184f55f0ad2c8ba3d057ed199fd1442a552decf2beafef3b7d24
-
Size
36KB
-
MD5
6955607e7016a009b16ec2d035b2e820
-
SHA1
f219357638dd951f5ec8686ab6b1b24fb05e9a1c
-
SHA256
7dae598a9f26184f55f0ad2c8ba3d057ed199fd1442a552decf2beafef3b7d24
-
SHA512
354baa6f459dd8aba4a47f4937047d505c4dd29ca5c9d19776088de9a57c37101951e8257f2cd52fa3f4f2b8c55020846420c0f373f2d259c5f352ae076ed005
-
SSDEEP
768:lPjnAptGZZun3SoTUeA3sqIZ3DhKIRVm/M:9jnIEKCotSsq2lKIR0/
Malware Config
Signatures
Files
-
7dae598a9f26184f55f0ad2c8ba3d057ed199fd1442a552decf2beafef3b7d24.exe windows x86
beb2e629899ff7d0a014c52d75a5565c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
AbortSystemShutdownA
InitiateSystemShutdownA
kernel32
LocalAlloc
GetLastError
GetCurrentProcess
GetCommandLineA
GetVersion
ExitProcess
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
LCMapStringA
LCMapStringW
CreateFileA
CloseHandle
HeapFree
HeapAlloc
GetStringTypeA
GetStringTypeW
VirtualAlloc
GetProcAddress
LoadLibraryA
FlushFileBuffers
SetFilePointer
SetStdHandle
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE