Static task
static1
Behavioral task
behavioral1
Sample
8a48310c658d3a9e58a3b13124c666b5006fcd808b553b1f14392c9ca73e67e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a48310c658d3a9e58a3b13124c666b5006fcd808b553b1f14392c9ca73e67e2.exe
Resource
win10v2004-20220812-en
General
-
Target
8a48310c658d3a9e58a3b13124c666b5006fcd808b553b1f14392c9ca73e67e2
-
Size
52KB
-
MD5
56f87ff98d471b0ee04d1a31b3bf19c3
-
SHA1
2b1d0d098d4d4aa28753936b1fa29ae616eaed5d
-
SHA256
8a48310c658d3a9e58a3b13124c666b5006fcd808b553b1f14392c9ca73e67e2
-
SHA512
2bc93626021e46aa9a386e497f7f1e557b073a7f75b8f6c5041aa7fbd9ffcb945ab53ae08d3822420d1390815e508dd3e8382a2393a2496ae0e74e8a0f329068
-
SSDEEP
384:b5fmTziYNscNeLNek+vDssHe6IsaJJaZn+ZfgokFxIS7ySh2dtW9HZz:tiOUGsHeXfggfLkTINSobWdZz
Malware Config
Signatures
Files
-
8a48310c658d3a9e58a3b13124c666b5006fcd808b553b1f14392c9ca73e67e2.exe windows x86
c89c76d36109fcbd89b7c3a8a9aec4c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeConsole
GetDateFormatA
GetLastError
SetLastError
GetDiskFreeSpaceExA
PulseEvent
TlsGetValue
EnumResourceTypesA
GetCommandLineA
IsBadReadPtr
CloseHandle
LoadLibraryExW
IsBadCodePtr
LocalFree
Sleep
VirtualProtect
DeleteCriticalSection
GetDriveTypeW
GetModuleHandleA
FindClose
advapi32
RegLoadKeyA
LsaClose
OpenEventLogA
FreeSid
AccessCheck
IsValidSid
LsaFreeMemory
GetFileSecurityA
LsaSetSecret
RegCloseKey
CloseEventLog
CloseTrace
RegCreateKeyExA
RegCloseKey
clbcatq
GetComputerObject
SetSetupOpen
ComPlusMigrate
GetCatalogObject
DowngradeAPL
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE