Static task
static1
Behavioral task
behavioral1
Sample
c9d78fcb82cae4cc7708871b4f041d988d8b5830b3026a98088435634aa911b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c9d78fcb82cae4cc7708871b4f041d988d8b5830b3026a98088435634aa911b2.exe
Resource
win10v2004-20221111-en
General
-
Target
c9d78fcb82cae4cc7708871b4f041d988d8b5830b3026a98088435634aa911b2
-
Size
812KB
-
MD5
dd56d6430d5ee959eb192662a8521c32
-
SHA1
1a62ec89b8aee3da74109fa0e5be1de205284530
-
SHA256
c9d78fcb82cae4cc7708871b4f041d988d8b5830b3026a98088435634aa911b2
-
SHA512
cd1b9cd3401a8446a74b2d3195a1fbe1dd5faa6c4c7d269651b0e6abb2bb36751c7269ea9f5706e7956cd857207f53470cd0e324b6a3699d3d8f8c98f7096306
-
SSDEEP
12288:Y2uOnMEBZPsclUMmnOTHSzgGWdXIsTQ6d36TfA90o0UHs+PW+lGI:R3MEBdscXmn0H+grKsTndoAkUM+BlX
Malware Config
Signatures
Files
-
c9d78fcb82cae4cc7708871b4f041d988d8b5830b3026a98088435634aa911b2.exe windows x86
2c1cb88a027df4eef96fef24cf4b9b16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
DeleteFileA
SetLastError
FileTimeToSystemTime
HeapCreate
GetCommandLineA
CreateSemaphoreA
HeapDestroy
lstrlenW
WriteConsoleA
CloseHandle
SuspendThread
GetStartupInfoA
OpenEventA
GetEnvironmentVariableA
EnumResourceTypesW
Sleep
CloseHandle
FindVolumeClose
GetCommandLineA
advapi32
ControlService
IsValidSid
IsValidSid
CloseEventLog
IsValidSid
RegCreateKeyExW
RegEnumKeyA
InitializeSid
IsValidAcl
IsValidSid
RegDeleteValueA
IsValidSid
CreateServiceW
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ