Static task
static1
Behavioral task
behavioral1
Sample
38c5b0e92791ce634893d17798f267596fec3ce5984c01867bbd8169ace8ca0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38c5b0e92791ce634893d17798f267596fec3ce5984c01867bbd8169ace8ca0c.exe
Resource
win10v2004-20220812-en
General
-
Target
38c5b0e92791ce634893d17798f267596fec3ce5984c01867bbd8169ace8ca0c
-
Size
510KB
-
MD5
47d524d6112b72fc773f4f86f44c65c4
-
SHA1
b3a5c8c5979d03220e12b748044c9449e06675ab
-
SHA256
38c5b0e92791ce634893d17798f267596fec3ce5984c01867bbd8169ace8ca0c
-
SHA512
b8d70c45e3583fb30371ac00db5e279eea1a74fc156b3ee77cd3d3d4cc157fa886d36471486cffafc1f35035a675dd166e329ed4072778c418e10dfea004b644
-
SSDEEP
12288:7tf5dqnVRAEbAqh9yyuvBY8crF8eDeLmRRB0EDq2:7JqVRAEEqhwyuvBA6mBnDJ
Malware Config
Signatures
Files
-
38c5b0e92791ce634893d17798f267596fec3ce5984c01867bbd8169ace8ca0c.exe windows x86
4c42b806005772094c6601f4effff911
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
GetCommandLineA
GetModuleHandleA
HeapDestroy
FindVolumeClose
WriteConsoleA
SuspendThread
GetCommandLineA
HeapCreate
CloseHandle
GlobalFlags
GetEnvironmentVariableA
DeleteFileA
CreateEventW
GetStartupInfoA
EnumResourceTypesW
FileTimeToSystemTime
SetLastError
CloseHandle
lstrlenA
advapi32
CloseEventLog
IsValidSid
RegEnumKeyA
ControlService
CreateServiceW
IsValidSid
IsValidAcl
IsValidSid
RegDeleteValueA
IsValidSid
InitializeSid
RegCreateKeyExW
IsValidSid
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ