Static task
static1
Behavioral task
behavioral1
Sample
af53d9a1957a78c6e6571e2fc5f5dba7745ec68ff57e489069db5252741aa1d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af53d9a1957a78c6e6571e2fc5f5dba7745ec68ff57e489069db5252741aa1d5.exe
Resource
win10v2004-20221111-en
General
-
Target
af53d9a1957a78c6e6571e2fc5f5dba7745ec68ff57e489069db5252741aa1d5
-
Size
297KB
-
MD5
5678be4fa9c12fa581e67e9d666c6762
-
SHA1
93b7d41347e4da5ff421284b33e6c49c30e49b8a
-
SHA256
af53d9a1957a78c6e6571e2fc5f5dba7745ec68ff57e489069db5252741aa1d5
-
SHA512
3992aaa8386662b24925c76e694454059fd0d4a1cd6d9c75155f4c4ed8d95b2227444d514c52e202edce7f427108e2d6c21b9da627f34e7b7d83210d43f6ab60
-
SSDEEP
6144:F/Sb9QyDE90NhEvXg1ttIIZU5ZoEeM2REaE/WLwJDiX9:FYDE90NhUQ1ttIz5OHRo/kW
Malware Config
Signatures
Files
-
af53d9a1957a78c6e6571e2fc5f5dba7745ec68ff57e489069db5252741aa1d5.exe windows x86
c2c0851720454209c58271c58e458c3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
FindAtomA
GetDriveTypeW
LoadLibraryW
CreateThread
GetComputerNameA
CreateFileA
GetCommandLineW
GetFileAttributesA
GetSystemTime
SetLastError
CloseHandle
HeapCreate
LocalFree
GetDiskFreeSpaceA
lstrlenA
GetExitCodeProcess
SetEvent
GetModuleHandleA
SuspendThread
advapi32
RegQueryValueA
GetFileSecurityA
GetLengthSid
RegCloseKey
FreeSid
RegCreateKeyExA
RegEnumValueA
IsTokenRestricted
GetUserNameA
CloseEventLog
CreateServiceW
RegDeleteKeyA
RegEnumKeyExA
cryptui
WizardFree
CryptUIDlgCertMgr
CryptUIDlgSelectStoreA
LocalEnroll
CryptUIDlgSelectCA
powercfg.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ