Static task
static1
Behavioral task
behavioral1
Sample
f4f752eb1de42da030a402772e238637137e26e412fd191d4c6a4e9748d21c26.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4f752eb1de42da030a402772e238637137e26e412fd191d4c6a4e9748d21c26.exe
Resource
win10v2004-20220812-en
General
-
Target
f4f752eb1de42da030a402772e238637137e26e412fd191d4c6a4e9748d21c26
-
Size
821KB
-
MD5
545e5debb576ff2e2e3646005e2bfbfc
-
SHA1
3fa3a957075cbc6be2fcf577bdce674ba1c903ae
-
SHA256
f4f752eb1de42da030a402772e238637137e26e412fd191d4c6a4e9748d21c26
-
SHA512
0c072ee5aee80a247f353b2d698f0c37299fe4d8437f9177b566d7e884f6e028a220fa8aceb0b8262df3a053d2f832772a235868e09fffb1edba6e9f435f3eea
-
SSDEEP
24576:rULRMcfFeWOWuRRgKE0AVqAs92HthcVSQX8b:rwRMcfIWOWuRRgKE0AVqxxSsK
Malware Config
Signatures
Files
-
f4f752eb1de42da030a402772e238637137e26e412fd191d4c6a4e9748d21c26.exe windows x86
4a2f8daa4082c488a8ac88f8ac64f75d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
CloseHandle
InterlockedExchange
WriteFile
GetSystemInfo
ResetEvent
CreateEventW
GetCommandLineW
GetPrivateProfileIntA
GetEnvironmentVariableA
LocalSize
ReleaseMutex
GlobalFree
LoadLibraryW
SuspendThread
CreateMutexW
FreeConsole
LocalFree
GetStdHandle
lstrlenA
advapi32
IsTextUnicode
CloseEventLog
CreateServiceW
RegCloseKey
RegQueryValueW
ControlService
RegEnumKeyA
RegDeleteValueA
InitializeSid
IsValidSecurityDescriptor
IsValidSid
ClearEventLogW
RegCreateKeyExW
InitializeSid
iernonce
InitCallback
InitCallback
InitCallback
InitCallback
InitCallback
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ