Static task
static1
Behavioral task
behavioral1
Sample
030a4593aab1533e641374266c72c11a532cfbcbc15c0d34175b6536b09697c2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
030a4593aab1533e641374266c72c11a532cfbcbc15c0d34175b6536b09697c2.exe
Resource
win10v2004-20221111-en
General
-
Target
030a4593aab1533e641374266c72c11a532cfbcbc15c0d34175b6536b09697c2
-
Size
297KB
-
MD5
d43e5fcf1928d46ecd340568197e9233
-
SHA1
74b661130b19c0aaab9b0eee89f2682e29c8b48b
-
SHA256
030a4593aab1533e641374266c72c11a532cfbcbc15c0d34175b6536b09697c2
-
SHA512
c560a3793679a584224a240c9183347f70b27f3d9c9087e4a2b9b1dd2f9a5d66e03ad530d50ba08243cd97648ea601ef34984d3fee58595ea26c0ddaa888c7c2
-
SSDEEP
6144:HeH4vkn84Cwbzwi/wT4cx46BPoG+SHwHulf8DEob66DKMfODno:HeH49xwXwiwMcxLBPo+H50g6DXms
Malware Config
Signatures
Files
-
030a4593aab1533e641374266c72c11a532cfbcbc15c0d34175b6536b09697c2.exe windows x86
36ee5251ad3589222f2749592debcce6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
GetDiskFreeSpaceW
ReadFileEx
GetExitCodeProcess
ReadConsoleA
InterlockedIncrement
lstrcmpA
LoadLibraryA
Heap32First
GetCurrentDirectoryA
GetLastError
HeapCreate
GetDiskFreeSpaceW
SetEnvironmentVariableA
CloseHandle
lstrcpyW
InterlockedDecrement
WaitForSingleObject
GetPrivateProfileIntA
GetStringTypeW
FindResourceW
adsldpc
ADsExecuteSearch
ADsDeleteClassDefinition
ADsCloseSearchHandle
ADsEnumAttributes
clbcatq
SetupOpen
DllGetClassObject
ComPlusMigrate
SetSetupSave
CheckMemoryGates
SetSetupSave
CheckMemoryGates
SetupOpen
ComPlusMigrate
DllGetClassObject
CheckMemoryGates
ComPlusMigrate
SetupOpen
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE