Static task
static1
Behavioral task
behavioral1
Sample
9586e6f4e099b653152dc807f61ce9a948136d93baf7cb89cac386dc23f8967f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9586e6f4e099b653152dc807f61ce9a948136d93baf7cb89cac386dc23f8967f.exe
Resource
win10v2004-20220812-en
General
-
Target
9586e6f4e099b653152dc807f61ce9a948136d93baf7cb89cac386dc23f8967f
-
Size
296KB
-
MD5
fd34f6914b5806c42c23edee9b92310d
-
SHA1
2c83d3baa3f408526b95556a1c4d8174c6123a80
-
SHA256
9586e6f4e099b653152dc807f61ce9a948136d93baf7cb89cac386dc23f8967f
-
SHA512
20383d632529b8f9a093e8b28b3e66e0b0a1f2c27539f54073de8edf0b6b7a9fd285d994c4ddf99d9aafd5e33bfb0a2e5ce365b6f891495bd72dfdc14e4239a9
-
SSDEEP
6144:FxeH4vkBt6w2wAUxokcFcG65FToybAv44FA37n/Pl7:FxeH42PEGzofv4Qe7/t7
Malware Config
Signatures
Files
-
9586e6f4e099b653152dc807f61ce9a948136d93baf7cb89cac386dc23f8967f.exe windows x86
edc6f06be89f5b18e5f7fb0511e2e480
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InterlockedIncrement
FindResourceW
WaitForSingleObject
ExitProcess
GetCurrentDirectoryA
GetPrivateProfileIntA
GetExitCodeProcess
InterlockedDecrement
SetEnvironmentVariableA
ReadConsoleA
GetLastError
GetStringTypeW
ReadFileEx
Heap32First
lstrcmpA
GetDiskFreeSpaceW
lstrcpyW
CloseHandle
GetDiskFreeSpaceW
HeapCreate
LoadLibraryA
adsldpc
ADsEnumAttributes
ADsDeleteClassDefinition
ADsCloseSearchHandle
ADsExecuteSearch
clbcatq
SetupOpen
CheckMemoryGates
SetSetupSave
SetupOpen
CheckMemoryGates
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
CheckMemoryGates
ComPlusMigrate
DllGetClassObject
SetupOpen
SetSetupSave
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ