Static task
static1
Behavioral task
behavioral1
Sample
4c589ecc28b26c6ae0a672b03afceb20148c0db16b6bb792561b938e545eb905.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c589ecc28b26c6ae0a672b03afceb20148c0db16b6bb792561b938e545eb905.exe
Resource
win10v2004-20220901-en
General
-
Target
4c589ecc28b26c6ae0a672b03afceb20148c0db16b6bb792561b938e545eb905
-
Size
172KB
-
MD5
a0f98d66bc9a227e3bc59d93582061ee
-
SHA1
f427815bacfda545816b6f25218b2aa3b09464e5
-
SHA256
4c589ecc28b26c6ae0a672b03afceb20148c0db16b6bb792561b938e545eb905
-
SHA512
b845e40db35ccd15595fc2003be104eeac0315b7b74ce82dbd5c61169ae2799edd1437a707f82037a1e925059fc6b840e0464fb4fd82bf624d3afae3c6b76c97
-
SSDEEP
3072:DLnkbiDMbCst4QW9Gr0duDi2nJSmAGsF7tmSSZEnS5FXiq9QMouHY2xE:DrwiiC9GIdui2JSF7ozWnSCqfoWY
Malware Config
Signatures
Files
-
4c589ecc28b26c6ae0a672b03afceb20148c0db16b6bb792561b938e545eb905.exe windows x86
80d6597cb462c3d52c6f607ef74578c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ