Static task
static1
Behavioral task
behavioral1
Sample
de8a159b42a26fd8e2f2fd6333a68580fa579e4567a254d2c3098c3fcb9a98fa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de8a159b42a26fd8e2f2fd6333a68580fa579e4567a254d2c3098c3fcb9a98fa.exe
Resource
win10v2004-20221111-en
General
-
Target
de8a159b42a26fd8e2f2fd6333a68580fa579e4567a254d2c3098c3fcb9a98fa
-
Size
296KB
-
MD5
393e11464b852ec0cfb39652d4bd0986
-
SHA1
9b58d96dc61e7a34da8b2aeb3cf9a88b298c7910
-
SHA256
de8a159b42a26fd8e2f2fd6333a68580fa579e4567a254d2c3098c3fcb9a98fa
-
SHA512
2f16acfc0114b009f0b5dbd297a38e40e77c7094df80f4e0b693cf3ca6f263121cbba98eff671a873da831a42a727a9953fa4bf419795db5fb4be9472fdd5a40
-
SSDEEP
6144:FeH4vkXx/IG1Zd0UTZHSFIWtB0+02jjNLK5F0ipnhrwuHanc19QFo5/XP:FeH40+UTl6H0+0cOhrwuJ19uo5/XP
Malware Config
Signatures
Files
-
de8a159b42a26fd8e2f2fd6333a68580fa579e4567a254d2c3098c3fcb9a98fa.exe windows x86
4d32ff3be9ace52b6704df673a7883d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
GetDiskFreeSpaceW
HeapCreate
ReadFileEx
FindResourceW
lstrcatW
GetLastError
DeviceIoControl
ReadConsoleA
CreateEventW
lstrcpyW
GetDiskFreeSpaceW
LoadLibraryA
GetPrivateProfileIntA
Heap32First
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetEnvironmentVariableA
HeapReAlloc
CloseHandle
adsldpc
ADsDeleteClassDefinition
ADsEnumAttributes
ADsCloseSearchHandle
ADsExecuteSearch
uxtheme
GetThemeTextMetrics
SetWindowTheme
CloseThemeData
GetThemeSysSize
IsThemeActive
DrawThemeEdge
OpenThemeData
GetThemeColor
GetThemeTextExtent
CloseThemeData
DrawThemeBackground
GetThemeBool
GetWindowTheme
SetWindowTheme
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ