Static task
static1
Behavioral task
behavioral1
Sample
ad91d4f5be9178df7b570e6db5a8d1fded1a95e843b30be108ed821b33504b33.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad91d4f5be9178df7b570e6db5a8d1fded1a95e843b30be108ed821b33504b33.exe
Resource
win10v2004-20221111-en
General
-
Target
ad91d4f5be9178df7b570e6db5a8d1fded1a95e843b30be108ed821b33504b33
-
Size
10KB
-
MD5
f6ec322450da7ee7f89092d4f7fb370a
-
SHA1
50792442361e3fd992f17361cb1611ced431aad5
-
SHA256
ad91d4f5be9178df7b570e6db5a8d1fded1a95e843b30be108ed821b33504b33
-
SHA512
edf1d87789957597355c46c6343e9718eae70d2b073d5a6ddef4c610007e297aaac877d17a13730f1d8ebc4e1b17d84c9bc2e546d99bb30e63e402bdfef64955
-
SSDEEP
192:3rqvqucLm8WrcchKMqiJQjwPRn4sU9Vw:3rUqbOPhKMqkPws
Malware Config
Signatures
Files
-
ad91d4f5be9178df7b570e6db5a8d1fded1a95e843b30be108ed821b33504b33.exe windows x86
91b2790c505bbe69e215e722d884b1b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
crtdll
sprintf
kernel32
CreateProcessA
GlobalAddAtomA
GlobalFindAtomA
GetVersion
GetTempPathA
GetTickCount
ExitProcess
GetModuleFileNameA
CopyFileA
Sleep
CloseHandle
GetModuleHandleA
GetCurrentProcess
CreateFileA
ReadFile
SetFilePointer
WriteFile
GetFileSize
GlobalAlloc
DeleteFileA
user32
ExitWindowsEx
shell32
ShellExecuteA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ