Static task
static1
Behavioral task
behavioral1
Sample
58a72438de50a4d30af6d9de3fe0627f57de34993aa1076d71fffa69e9b1926a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
58a72438de50a4d30af6d9de3fe0627f57de34993aa1076d71fffa69e9b1926a.exe
Resource
win10v2004-20221111-en
General
-
Target
58a72438de50a4d30af6d9de3fe0627f57de34993aa1076d71fffa69e9b1926a
-
Size
174KB
-
MD5
3dd30c92c8608534362946061a874051
-
SHA1
3522a1cb1dd842caf028dfac6a4c227dbf4c8fc1
-
SHA256
58a72438de50a4d30af6d9de3fe0627f57de34993aa1076d71fffa69e9b1926a
-
SHA512
0dc1cce8755d47cfb7d2d11611fa04e8a2cc0ab2b51ce681abcfb52a09592804355f80dc2c70a4f49e3ba4091fa6927e3370e2c1e401f087dcc01c962fb33a22
-
SSDEEP
3072:4EQdpBKGalqNVq5LGxJybL95BfCkHJp81dazQFBm94RYP+JQ0DA:od2Gal+VCEJkLBakpp81U4RYPj
Malware Config
Signatures
Files
-
58a72438de50a4d30af6d9de3fe0627f57de34993aa1076d71fffa69e9b1926a.exe windows x86
80d6597cb462c3d52c6f607ef74578c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ