Static task
static1
Behavioral task
behavioral1
Sample
01725db24247087789fcd0848bc121edcf6531977e8a299238b112a281a3a36a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
01725db24247087789fcd0848bc121edcf6531977e8a299238b112a281a3a36a.exe
Resource
win10v2004-20221111-en
General
-
Target
01725db24247087789fcd0848bc121edcf6531977e8a299238b112a281a3a36a
-
Size
870KB
-
MD5
e13466f9e7e717e168b3dd3d44199049
-
SHA1
a18822f5e8b1dbc5de22bf3d66000be4edd0ac4d
-
SHA256
01725db24247087789fcd0848bc121edcf6531977e8a299238b112a281a3a36a
-
SHA512
afece50fccc887435730d1ad3ab91dbe0ab4fac669b343a8b009de0e50e89f7aad7d94ec6c3670c15c43b07cdd4ed83b0c3c2f281e5cf83e881d26b81b559245
-
SSDEEP
24576:y5fFqJ7UzgigAgH3rrZG39ZLVUnxLoiML3QVC:y2ZUzMbA7VUnxLoiq8C
Malware Config
Signatures
Files
-
01725db24247087789fcd0848bc121edcf6531977e8a299238b112a281a3a36a.exe windows x86
ea77513fe7c47098d012e092fe76e174
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetModuleHandleA
GetEnvironmentVariableA
CreateFileA
SetEvent
CancelIo
GetStartupInfoA
GetStdHandle
IsBadStringPtrA
GetModuleFileNameA
GetCommandLineW
CreateFileMappingA
HeapCreate
lstrlenA
ReleaseMutex
ResetEvent
TlsAlloc
GetACP
HeapDestroy
ResumeThread
advapi32
ControlService
RegEnumKeyA
CreateProcessAsUserA
IsValidSecurityDescriptor
IsValidAcl
RegDeleteValueA
IsTextUnicode
IsValidSid
RegQueryValueW
InitializeSid
ClearEventLogW
CreateServiceW
RegCreateKeyExW
tspkg
SpLsaModeInitialize
SpLsaModeInitialize
SpLsaModeInitialize
SpLsaModeInitialize
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 862KB - Virtual size: 861KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ