Static task
static1
Behavioral task
behavioral1
Sample
b37ee1d65c3d8dc0b27a7e720d1c87bec7966830a75f555948b8edd28a6ba358.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b37ee1d65c3d8dc0b27a7e720d1c87bec7966830a75f555948b8edd28a6ba358.exe
Resource
win10v2004-20220901-en
General
-
Target
b37ee1d65c3d8dc0b27a7e720d1c87bec7966830a75f555948b8edd28a6ba358
-
Size
90KB
-
MD5
0e109b4d97f8da6dc69d3c4c53744b30
-
SHA1
e40e5ab884c34194e2f67697c8aa55d78652e70f
-
SHA256
b37ee1d65c3d8dc0b27a7e720d1c87bec7966830a75f555948b8edd28a6ba358
-
SHA512
efaed9a2b1605fb4ad1c3a28ca8a9701363ee99f68c1a0546649cfb1a5728eab04bfb0575d5ed03582963c64876eb5865072526fd8165c598e004d537fdfae47
-
SSDEEP
1536:cf+i3BKW1sZTetJFoTdcwk0G1Nai6ypzWvU:cfke2epoJk0IfpzWv
Malware Config
Signatures
Files
-
b37ee1d65c3d8dc0b27a7e720d1c87bec7966830a75f555948b8edd28a6ba358.exe windows x86
026b7feb6e2fe33085f13176ae9268fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyW
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegQueryValueExW
FreeSid
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
CloseServiceHandle
DeleteService
OpenServiceW
OpenSCManagerW
user32
MessageBoxW
wsprintfW
kernel32
FreeLibrary
GetVersion
ExitProcess
LocalFree
FormatMessageW
GetCurrentProcess
GetLastError
GetCurrentThread
lstrcatW
lstrlenW
lstrcpyW
lstrcmpiW
CloseHandle
CreateFileW
GetPrivateProfileStringW
GetVersionExW
FindClose
MoveFileExW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
FindFirstFileW
GetSystemDirectoryW
GetWindowsDirectoryW
DeleteFileW
FindNextFileW
CreateProcessW
FreeEnvironmentStringsA
GetProcAddress
LoadLibraryW
MultiByteToWideChar
HeapFree
HeapAlloc
WideCharToMultiByte
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetStdHandle
SetHandleCount
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeW
GetFileType
RtlUnwind
WriteFile
SetStdHandle
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
ReadFile
SetEndOfFile
LCMapStringA
LCMapStringW
GetStringTypeA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE