Static task
static1
Behavioral task
behavioral1
Sample
a6578db14d6b301b24fa38a5fd644e2c9d689b089a24d8f0a13c33831fe29baa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a6578db14d6b301b24fa38a5fd644e2c9d689b089a24d8f0a13c33831fe29baa.exe
Resource
win10v2004-20220812-en
General
-
Target
a6578db14d6b301b24fa38a5fd644e2c9d689b089a24d8f0a13c33831fe29baa
-
Size
299KB
-
MD5
cd60195df5173ad801accd55f73b4527
-
SHA1
e58e94561776994dc54b727bbbfd1e6aa8119062
-
SHA256
a6578db14d6b301b24fa38a5fd644e2c9d689b089a24d8f0a13c33831fe29baa
-
SHA512
b477b7a1358ddc654d93b913337737d6525bf263efec38f12a59caa7a85e6ebe51e6c5e96bf1ea6d1f8c0f8820f17aa3871c2ed0082e91ac141b428edbd0c2df
-
SSDEEP
6144:S7jy1/XIuXEpoeKmPiU/1h45gc+MpyQYquWyv0aFnV5MDvsTPk0:Qy1/lEpRqM+OcxQrTjIDvg
Malware Config
Signatures
Files
-
a6578db14d6b301b24fa38a5fd644e2c9d689b089a24d8f0a13c33831fe29baa.exe windows x86
07556cdf93568a4715aaaa575ce71e1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
CloseHandle
CreateMutexW
LoadLibraryW
ReleaseMutex
InterlockedExchange
GetSystemInfo
FreeConsole
GetCommandLineW
ResetEvent
GetStdHandle
GetEnvironmentVariableA
GetPrivateProfileIntA
CreateEventW
LocalSize
lstrlenA
SuspendThread
VirtualAllocEx
GlobalFree
WriteFile
advapi32
RegQueryValueW
RegCloseKey
RegCreateKeyExW
IsValidSecurityDescriptor
CreateServiceW
ControlService
IsValidSid
RegEnumKeyA
InitializeSid
IsTextUnicode
CloseEventLog
ClearEventLogW
RegDeleteValueA
InitializeSid
fwcfg
InitHelperDll
InitHelperDll
InitHelperDll
InitHelperDll
InitHelperDll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ