Static task
static1
Behavioral task
behavioral1
Sample
a4f27c838b20da23bf842c100aa68baf89ec9e7326178b3ca35374f3760ece17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4f27c838b20da23bf842c100aa68baf89ec9e7326178b3ca35374f3760ece17.exe
Resource
win10v2004-20220901-en
General
-
Target
a4f27c838b20da23bf842c100aa68baf89ec9e7326178b3ca35374f3760ece17
-
Size
25KB
-
MD5
8294c4ee47d25eff30fddc0e62967e83
-
SHA1
b62ca20da8081937794824bd9357e3d2f06d472f
-
SHA256
a4f27c838b20da23bf842c100aa68baf89ec9e7326178b3ca35374f3760ece17
-
SHA512
2ce05e87b14d6b85a8c2c32462d29b5b79c8a739b5514fb0522cd7854826bd45dcd26b7530ded5eac3420e6624cd2a1a7b3612b04a4a2462bd95780fac9bf2e6
-
SSDEEP
384:kBETCy6xJrJ577uGdqntN0rR7BMsC09Tq/59j5bKPGW1vx:ki1wFV4ntQR7qsJ9Ta59tKuWhx
Malware Config
Signatures
Files
-
a4f27c838b20da23bf842c100aa68baf89ec9e7326178b3ca35374f3760ece17.exe windows x86
61cdc212519de398e019c0c06d8478b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetCommandLineA
GetTimeFormatW
EnumResourceTypesA
HeapDestroy
GetFileAttributesW
SetLastError
GetCommandLineA
HeapCreate
DeleteFileA
GetEnvironmentVariableA
lstrlenA
WriteConsoleA
GetModuleHandleA
CreateEventW
CloseHandle
GetDriveTypeW
GlobalFlags
GetConsoleTitleA
GetStartupInfoA
advapi32
IsValidSid
RegEnumKeyA
InitializeSid
IsValidSecurityDescriptor
RegDeleteValueA
CreateProcessAsUserW
IsValidSid
IsValidSid
IsValidAcl
RegCreateKeyExW
IsValidSid
RegQueryValueW
IsValidSid
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE