Static task
static1
Behavioral task
behavioral1
Sample
2cff5833d04f57809299184f11de123ed6efd0129fa256b72ea5652696357b92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2cff5833d04f57809299184f11de123ed6efd0129fa256b72ea5652696357b92.exe
Resource
win10v2004-20220901-en
General
-
Target
2cff5833d04f57809299184f11de123ed6efd0129fa256b72ea5652696357b92
-
Size
747KB
-
MD5
073582e195971e3a7d981b0e1134c577
-
SHA1
e6de4b74a87c88219f8587f6399eec71f9cecd9b
-
SHA256
2cff5833d04f57809299184f11de123ed6efd0129fa256b72ea5652696357b92
-
SHA512
5c685aeaae0c1fbd13b790a2de4dc05868d109060f21ac3b7b9c5474deec484a7b1c195cb5df12de89cc93ce1a50c656a35ece7fcd007f39fc08c698a7c044ed
-
SSDEEP
12288:G+TppGkxH7LN2tP/E418B5o6dFtPYrbOIuljs3u+UG51v1Nl9EPEYQZ8I:GKSkxH752tPO5o65PY3OIPe1G5B1NlSM
Malware Config
Signatures
Files
-
2cff5833d04f57809299184f11de123ed6efd0129fa256b72ea5652696357b92.exe windows x86
b1b27d49f3dcf9992830bcd5bbb2a968
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CloseHandle
WriteConsoleA
GetFileAttributesW
CreateEventW
HeapDestroy
SetLastError
GlobalFlags
lstrlenA
CloseHandle
GetCommandLineA
CreateSemaphoreA
EnumResourceTypesW
GetConsoleTitleW
GetCommandLineA
GetEnvironmentVariableA
GetDriveTypeW
HeapCreate
GetStartupInfoA
DeleteFileA
advapi32
IsValidSid
CreateServiceW
CloseEventLog
InitializeSid
IsValidSid
IsValidAcl
RegDeleteValueA
RegCreateKeyExW
ControlService
RegEnumKeyA
IsValidSid
IsValidSid
IsValidSid
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ