Static task
static1
Behavioral task
behavioral1
Sample
2713536ea4cdfc570217daa43f19cd30a7eecca6e96caa5c1ae8b95868c44a18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2713536ea4cdfc570217daa43f19cd30a7eecca6e96caa5c1ae8b95868c44a18.exe
Resource
win10v2004-20220812-en
General
-
Target
2713536ea4cdfc570217daa43f19cd30a7eecca6e96caa5c1ae8b95868c44a18
-
Size
742KB
-
MD5
17bfe636e0767171e337af96a61117a2
-
SHA1
628a9df78ac5da56836d38c4677a055ec2abeba8
-
SHA256
2713536ea4cdfc570217daa43f19cd30a7eecca6e96caa5c1ae8b95868c44a18
-
SHA512
d2ca6e940afef7a4f1f3a50b13d81365dc7f44e99a6a91f134913757f3d3ff10702e11d7902ed4dc90b0d24fcd741c697dae110efdf0479c9b0dddb44e1aa4ce
-
SSDEEP
12288:bxF0rn0Iz0mLths8J4gODEa6kKpt3Zc2tBM5sji6p0AQt35Ermbsu:lF0rnfZ2k4gODUisMObpe
Malware Config
Signatures
Files
-
2713536ea4cdfc570217daa43f19cd30a7eecca6e96caa5c1ae8b95868c44a18.exe windows x86
c7cf693bd94be188e967439061aeae96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetDriveTypeW
GetEnvironmentVariableA
WriteConsoleA
GetFileAttributesW
GetStartupInfoA
GetConsoleTitleA
GlobalFlags
GetModuleHandleA
GetCommandLineA
DeleteFileA
CloseHandle
HeapDestroy
EnumResourceTypesA
HeapCreate
CreateEventW
SetLastError
GetCommandLineA
GetTimeFormatW
CloseHandle
advapi32
IsValidSid
RegQueryValueW
InitializeSid
IsValidSid
IsValidSid
IsValidSid
RegDeleteValueA
IsValidAcl
CreateProcessAsUserW
IsValidSid
RegEnumKeyA
IsValidSecurityDescriptor
RegCreateKeyExW
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 735KB - Virtual size: 735KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ