Static task
static1
Behavioral task
behavioral1
Sample
b2d02874aca47d3a446886210306822d4d9786aa57f273eb5d706c6f367eb2c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2d02874aca47d3a446886210306822d4d9786aa57f273eb5d706c6f367eb2c6.exe
Resource
win10v2004-20221111-en
General
-
Target
b2d02874aca47d3a446886210306822d4d9786aa57f273eb5d706c6f367eb2c6
-
Size
812KB
-
MD5
d3735bbab92a37956d56659e3035f099
-
SHA1
4a0f08d08fce028d854a095de919c4008b025d69
-
SHA256
b2d02874aca47d3a446886210306822d4d9786aa57f273eb5d706c6f367eb2c6
-
SHA512
f6f4ec6ec852893dc2b820c501c96d0e518d522704285c83565ab4b58c4cfe4827e387b9c771ec3ba88fc914500577ece6ba9c6ab347ba8406050a3a88c4a662
-
SSDEEP
12288:/WvwOnMEBZPsclUMmnOTHSzgGWdXIsTQ6d36TfA90o0UHs+PW+lGI:2MEBdscXmn0H+grKsTndoAkUM+BlX
Malware Config
Signatures
Files
-
b2d02874aca47d3a446886210306822d4d9786aa57f273eb5d706c6f367eb2c6.exe windows x86
5374bc18ab67f852211dd21c23b955ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
WriteConsoleA
GetEnvironmentVariableA
SuspendThread
CloseHandle
FileTimeToSystemTime
CreateSemaphoreA
DeleteFileA
lstrlenW
OpenEventA
FindVolumeClose
SetLastError
HeapDestroy
Sleep
GetStartupInfoA
GetCommandLineA
GetModuleHandleA
HeapCreate
EnumResourceTypesW
CloseHandle
advapi32
CreateServiceW
IsValidSid
IsValidAcl
RegEnumKeyA
IsValidSid
RegDeleteValueA
InitializeSid
ControlService
CloseEventLog
RegCreateKeyExW
IsValidSid
IsValidSid
IsValidSid
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ