Static task
static1
Behavioral task
behavioral1
Sample
3f44a2f68321455c2de063652a143159702b575d31abe8ead3146e29671dc46d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f44a2f68321455c2de063652a143159702b575d31abe8ead3146e29671dc46d.exe
Resource
win10v2004-20220901-en
General
-
Target
3f44a2f68321455c2de063652a143159702b575d31abe8ead3146e29671dc46d
-
Size
87KB
-
MD5
a1f6132891db32374375340ecf233e0a
-
SHA1
a0462410b120c4354b5bb3a7273186d49cdbf114
-
SHA256
3f44a2f68321455c2de063652a143159702b575d31abe8ead3146e29671dc46d
-
SHA512
b7502bfcf8df19d5d9933a1f551899bd575c25f35c3d3c81b6b925b3a6e77028b61eefdfccb55ac1b882d9d7b76a5ab5d46e0f2e24873c06fb9c033cd2e7b512
-
SSDEEP
1536:MZK9P3EA6cyXfL8gOGhK7ZhCl8JxtaRw2I+X0aqJ3:MO3EDAgfhKd8l8haqsqJ3
Malware Config
Signatures
Files
-
3f44a2f68321455c2de063652a143159702b575d31abe8ead3146e29671dc46d.exe windows x86
8406cbd74c4f8c0034bf24c665196ee8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
HeapCreate
GlobalFlags
GetStartupInfoA
GetEnvironmentVariableA
DeleteFileA
GetCommandLineA
CreateEventW
EnumResourceTypesA
HeapDestroy
WriteConsoleA
CloseHandle
CloseHandle
GetDriveTypeW
GetCommandLineA
GetConsoleTitleA
GetModuleHandleA
GetTimeFormatW
SetLastError
lstrlenA
advapi32
IsValidSid
IsValidAcl
RegCreateKeyExW
RegDeleteValueA
IsValidSid
RegQueryValueW
IsValidSid
IsValidSid
InitializeSid
IsValidSid
IsValidSecurityDescriptor
CreateProcessAsUserW
RegEnumKeyA
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE