Static task
static1
Behavioral task
behavioral1
Sample
69e5e983d665a3d437315ba0f0a5bdd1c7a84687d24f793f5931c31de88086b3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
69e5e983d665a3d437315ba0f0a5bdd1c7a84687d24f793f5931c31de88086b3.exe
Resource
win10v2004-20221111-en
General
-
Target
69e5e983d665a3d437315ba0f0a5bdd1c7a84687d24f793f5931c31de88086b3
-
Size
164KB
-
MD5
bccf56e1a900aedbb12073516eea368a
-
SHA1
082ac5e29179aab2cee1435dccc370e7d58ddfc7
-
SHA256
69e5e983d665a3d437315ba0f0a5bdd1c7a84687d24f793f5931c31de88086b3
-
SHA512
fda5a6e7337742df2f24271f1b4766eb904eb5eaf714063459223dc250326d25a85b4e64e40faef05a9805ca85c52440b248af969cb53c6b5608cfeb17f98894
-
SSDEEP
3072:kEIMc7dOIppHIQZalx5EiKsSLEqxfuMFX4bp+2Kam7cgrw/xyJH5gUSXx1:FIMc7dlUIAEinSLEgfuMd4bp+2Kj7X6n
Malware Config
Signatures
Files
-
69e5e983d665a3d437315ba0f0a5bdd1c7a84687d24f793f5931c31de88086b3.exe windows x86
4823cf26e2f64807d938472e183290ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
winspool.drv
ClosePrinter
kernel32
GetVersionExW
GetTickCount
InterlockedExchange
LocalFree
LoadLibraryW
InterlockedDecrement
LocalAlloc
GetThreadPriority
GetCurrentThreadId
LockResource
GetVersion
CloseHandle
FlushFileBuffers
GetSystemDirectoryA
GetCurrentProcessId
IsBadReadPtr
GetVersionExA
GetFileType
TerminateProcess
GlobalFree
GetStartupInfoA
QueryPerformanceCounter
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExW
RegOpenKeyExW
LsaGetSystemAccessAccount
RegSetValueExW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ