Static task
static1
Behavioral task
behavioral1
Sample
d42ae51364c08b53b67973e01dd0c04a03e189f3e7e185f8301643542d29b2e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d42ae51364c08b53b67973e01dd0c04a03e189f3e7e185f8301643542d29b2e4.exe
Resource
win10v2004-20220812-en
General
-
Target
d42ae51364c08b53b67973e01dd0c04a03e189f3e7e185f8301643542d29b2e4
-
Size
299KB
-
MD5
45f894fa70255311f7c654668f08c7c1
-
SHA1
234d295e490e52a09cc5453aa5682bd2a5a616d4
-
SHA256
d42ae51364c08b53b67973e01dd0c04a03e189f3e7e185f8301643542d29b2e4
-
SHA512
510543cc6e65effa5fcf6f138ccde54c2d10e6d2ae31564eefd4da8d0c56e3e0359e35689f86dc59e36ecab8bcaceec2142e09285ac88b0ebe430a9348cd7c86
-
SSDEEP
6144:toNfvxSttbmllUBKPbmLWtrSkiU9CHyYVh:CStbmlwKEkiUIyYVh
Malware Config
Signatures
Files
-
d42ae51364c08b53b67973e01dd0c04a03e189f3e7e185f8301643542d29b2e4.exe windows x86
4b24770bc45a17eb240dd8ccd1d0438f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
FindVolumeClose
SetLastError
ResumeThread
GetDiskFreeSpaceA
CloseHandle
LoadLibraryW
GetDriveTypeA
GetSystemTime
GetDateFormatA
LocalFree
HeapCreate
GetComputerNameA
GetTickCount
LocalUnlock
lstrlenA
CreateThread
GetModuleHandleA
GetCommandLineW
CreateFileA
advapi32
RegQueryValueA
GetUserNameA
GetLengthSid
RegEnumKeyExA
GetFileSecurityW
RegCloseKey
RegCreateKeyExA
CreateServiceA
FreeSid
RegEnumValueA
CloseEventLog
IsTokenUntrusted
RegDeleteKeyA
clbcatq
SetSetupSave
SetupOpen
DllGetClassObject
ComPlusMigrate
CheckMemoryGates
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ