Static task
static1
Behavioral task
behavioral1
Sample
1ce34c48b5622f40118c81f96a346530474b063f3522d2ce4bdecafa5e835fd3.exe
Resource
win7-20220812-en
General
-
Target
1ce34c48b5622f40118c81f96a346530474b063f3522d2ce4bdecafa5e835fd3
-
Size
228KB
-
MD5
7cf65daabb9a7ed36e935bcd1f1e29e0
-
SHA1
46e56a5a427880c6159dcf28871dfe31a2c29d1d
-
SHA256
1ce34c48b5622f40118c81f96a346530474b063f3522d2ce4bdecafa5e835fd3
-
SHA512
0866d7f4cdfb9ab7c4281c1e9c6a40ae38354d1ebdf0e33c8a7052fd274898eb56752e9b0de76eab075e0fe2ee264bf70a40c0a54089424dbb777c8ce3fe732c
-
SSDEEP
6144:IMXSzDm7N5oZWJNj09e32A+p+rXZnywh8:Ia7Q0JddrXNI
Malware Config
Signatures
Files
-
1ce34c48b5622f40118c81f96a346530474b063f3522d2ce4bdecafa5e835fd3.exe windows x86
23fb6204f53858e77e110140c4ea0fb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
VirtualProtect
IsBadReadPtr
GetProcAddress
GetLastError
GetCurrentProcess
VirtualAlloc
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
FreeLibrary
Sleep
GetModuleHandleA
GetStartupInfoA
advapi32
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
OpenProcessToken
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
msvcrt
_initterm
_onexit
__CxxFrameHandler
_CxxThrowException
memcpy
memset
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_controlfp
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
Sections
PAGE Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 200KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ