Static task
static1
Behavioral task
behavioral1
Sample
8371ad7b44a9fc02f2496526983184490d744243eef5185f8554c2f0001e2bb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8371ad7b44a9fc02f2496526983184490d744243eef5185f8554c2f0001e2bb5.exe
Resource
win10v2004-20220812-en
General
-
Target
8371ad7b44a9fc02f2496526983184490d744243eef5185f8554c2f0001e2bb5
-
Size
281KB
-
MD5
0927e510d4eea3749ed7d1ea7cabd810
-
SHA1
2868186dee62c5551d577dc48573ab216420322d
-
SHA256
8371ad7b44a9fc02f2496526983184490d744243eef5185f8554c2f0001e2bb5
-
SHA512
eaeaf9c426c3101c99e97a94f846f0ec2ebe20dea994af305df15bbbbda0e4495e806961d395ede79edc8eb8ce3d36c69c0e4221159d5ecb7f7583f318d9632a
-
SSDEEP
6144:suMd6ZyEkmqTjO4CqGxXVUCP3FrZUaErRGchn/6SbGq:ZMdrmjScXErRGcQS
Malware Config
Signatures
Files
-
8371ad7b44a9fc02f2496526983184490d744243eef5185f8554c2f0001e2bb5.exe windows x86
3eac2c15180856485762df7ed7757474
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
VirtualAlloc
Sleep
GetCommandLineA
CreateFileA
user32
LoadCursorW
LoadCursorA
LoadIconA
advapi32
SetSecurityDescriptorOwner
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorDacl
RegSetValueExW
RegOpenKeyW
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
RegQueryValueExW
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_ftol
_initterm
_wcsicmp
exit
free
malloc
wcscpy
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata5 Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ