Static task
static1
Behavioral task
behavioral1
Sample
50563f4c3b0ecb8d0ead20263cd3451b3df0ff2abaafff3a8c68110116079037.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50563f4c3b0ecb8d0ead20263cd3451b3df0ff2abaafff3a8c68110116079037.exe
Resource
win10v2004-20220901-en
General
-
Target
50563f4c3b0ecb8d0ead20263cd3451b3df0ff2abaafff3a8c68110116079037
-
Size
97KB
-
MD5
d63bf6e830247b07da2d1eb8b2567c74
-
SHA1
af2ea61301b07a43062a60d8ba704ede42f79731
-
SHA256
50563f4c3b0ecb8d0ead20263cd3451b3df0ff2abaafff3a8c68110116079037
-
SHA512
92b948aadf1b17b71c44e2ecf36a132dc724fe6d0c9c0fd206d45e3433ebec15c99b98ad8e35f60eba8016ffbbda6951dab97bfdd04ffb5412790ef194bf676d
-
SSDEEP
1536:i0g/0Rc3AmMn2TVKonmTrqLkvpMKNLDv+D93+czw2BHPjz7d9wxS:Dg8+onaKonGXv51vcJBJ9wxS
Malware Config
Signatures
Files
-
50563f4c3b0ecb8d0ead20263cd3451b3df0ff2abaafff3a8c68110116079037.exe windows x86
44b6a95e30dc98ceac59cb170745b5d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
SetFileAttributesA
FindFirstFileA
DeleteFileA
Sleep
FindClose
GetSystemTime
GetTickCount
GetTempPathA
GetEnvironmentVariableA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetVersionExA
GetCurrentThread
GetCurrentProcess
TerminateProcess
SetLastError
GetLastError
GetWindowsDirectoryA
CreateFileA
WriteFile
CreateProcessA
CloseHandle
GetTimeZoneInformation
GetLocalTime
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
RaiseException
HeapAlloc
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
LCMapStringA
LCMapStringW
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateDirectoryA
advapi32
RegEnumValueA
RegCloseKey
RegDeleteValueA
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
QueryServiceConfigA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
RegOpenKeyExA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE