Static task
static1
Behavioral task
behavioral1
Sample
0a1fda5f4d999c240c636402ba52aacd00847d63fea4a8be05072cad7658808f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0a1fda5f4d999c240c636402ba52aacd00847d63fea4a8be05072cad7658808f.exe
Resource
win10v2004-20220812-en
General
-
Target
0a1fda5f4d999c240c636402ba52aacd00847d63fea4a8be05072cad7658808f
-
Size
80KB
-
MD5
96a3cf6c75fd7ba9b554ef85783e0d00
-
SHA1
626a00bdd68f4691185cc89f4acffdd81bc883a3
-
SHA256
0a1fda5f4d999c240c636402ba52aacd00847d63fea4a8be05072cad7658808f
-
SHA512
61fe3935f1677204c463843d9fbf8686a6a8e98f1317cfd1a9c00c191923fef3b206b37379db0b20de6aafcf3c00d2a77666ba3d9771a208b8404b6b8ea6662c
-
SSDEEP
1536:eNDSdDt+N8ks7VUzAtpQ5bh2+HkqUhhH6a6yqEeYll3wMnNpSsVwtYE0e3ISSWIO:e04eksSzde+EVhd6abPTnNN6GOeaztx/
Malware Config
Signatures
Files
-
0a1fda5f4d999c240c636402ba52aacd00847d63fea4a8be05072cad7658808f.exe windows x86
5bf44b16adfb34740d006289eeaac67e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetEnvironmentVariableA
GetVersionExA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
GetSystemTimeAsFileTime
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
CloseServiceHandle
OpenServiceA
DeleteService
CreateServiceA
ControlService
QueryServiceConfigA
msvcr70
_iob
strcpy
free
strcat
sprintf
strlen
strncmp
perror
malloc
_strdup
_c_exit
_exit
_XcptFilter
exit
__p___initenv
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_except_handler3
_cexit
fprintf
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE