Static task
static1
Behavioral task
behavioral1
Sample
8c6162ed397a2d4a51e4ddf610775ca5bad3608eaf1a0a19daaef3215075ef21.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c6162ed397a2d4a51e4ddf610775ca5bad3608eaf1a0a19daaef3215075ef21.exe
Resource
win10v2004-20220812-en
General
-
Target
8c6162ed397a2d4a51e4ddf610775ca5bad3608eaf1a0a19daaef3215075ef21
-
Size
747KB
-
MD5
a387fe5bb404055aee26eadd57fa2392
-
SHA1
7a3fb0df71a88f69fef16774a7a0bc2b47c2067a
-
SHA256
8c6162ed397a2d4a51e4ddf610775ca5bad3608eaf1a0a19daaef3215075ef21
-
SHA512
dd2a6f69a97f6be2e20e48c9e85ed047cd9d94b899d847da2f8e6c401174187d4902b06b11673a6dc0e657949f9491619731f263e32c3493f19c0310b3bdd7f3
-
SSDEEP
12288:LfGtq/RuscQwu4iPtMJB+Nl1iDjewMdJlLNtMMuFgzYd9EyhG0jh7xniF7nr9V:zWqpdx4DkOZgJNMMuWDSpxid9
Malware Config
Signatures
Files
-
8c6162ed397a2d4a51e4ddf610775ca5bad3608eaf1a0a19daaef3215075ef21.exe windows x86
f495cc3133282866a81f0df154320c65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetCommandLineA
EnumResourceTypesA
GetEnvironmentVariableA
CloseHandle
CreateSemaphoreA
GetStartupInfoA
HeapDestroy
HeapCreate
GetModuleHandleA
lstrlenA
DeleteFileA
CreateEventW
GetFileAttributesW
WriteConsoleA
CloseHandle
SetLastError
GetConsoleTitleW
GetCommandLineA
GlobalFlags
advapi32
IsValidAcl
RegQueryValueW
CloseEventLog
IsValidSid
InitializeSid
IsValidSid
RegDeleteValueA
RegCreateKeyExW
RegEnumKeyA
IsValidSid
IsValidSid
IsValidSid
CreateProcessAsUserW
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ