Static task
static1
Behavioral task
behavioral1
Sample
555cc03357d9b8158b96cc37882b051e895005ef4bc685824cc99b69f8266956.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
555cc03357d9b8158b96cc37882b051e895005ef4bc685824cc99b69f8266956.exe
Resource
win10v2004-20220812-en
General
-
Target
555cc03357d9b8158b96cc37882b051e895005ef4bc685824cc99b69f8266956
-
Size
165KB
-
MD5
702a50a415cfb0db3b016f7a123f8488
-
SHA1
cff5195954e426a46dea3264bdaff9ba3c92d637
-
SHA256
555cc03357d9b8158b96cc37882b051e895005ef4bc685824cc99b69f8266956
-
SHA512
466261608207da2f6ca486c3d76d1542de941664c538142f3d08a308d136c874dee1cdd8d9c91b014e121c88227eb2c2d5b564d6921ef0c08ad9b704e5c30427
-
SSDEEP
3072:BCqmb4P1lptqyfbi/tSrO1kVstALuw88Ioe6FwzzZ7A6qC+7cQ:/mEP/ptqOi/8rOjc88Ioe6Kn5Aq+7c
Malware Config
Signatures
Files
-
555cc03357d9b8158b96cc37882b051e895005ef4bc685824cc99b69f8266956.exe windows x86
df6f46621cbbd6593009b0242f002278
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExA
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ