Static task
static1
Behavioral task
behavioral1
Sample
767bfac0f5540574943e56d48bd187ad29ead9a07bb371b3bd736aed58526c59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
767bfac0f5540574943e56d48bd187ad29ead9a07bb371b3bd736aed58526c59.exe
Resource
win10v2004-20220812-en
General
-
Target
767bfac0f5540574943e56d48bd187ad29ead9a07bb371b3bd736aed58526c59
-
Size
820KB
-
MD5
c1b45055785b1777d4a86829f9599364
-
SHA1
d45a7fa4de9fe664bc564345ec3481b6c590e3dd
-
SHA256
767bfac0f5540574943e56d48bd187ad29ead9a07bb371b3bd736aed58526c59
-
SHA512
64efc39e48d43c3d87a521452d3dced6aa815432046e2bf02f914b1083e20f0b461b146dc389bf19996b9325251ef444f526402b950eb6f2163408272cfbdc56
-
SSDEEP
24576:B7RMgimyzX4hypd1TGXvMcNz6Vr92R1jT6tn:9RMgixd5KDNG0j6d
Malware Config
Signatures
Files
-
767bfac0f5540574943e56d48bd187ad29ead9a07bb371b3bd736aed58526c59.exe windows x86
6a1244fc02a142b744ffa0ebf3c0929a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
InterlockedExchange
ResetEvent
ResumeThread
CreateMutexA
CreateEventA
GetPrivateProfileIntW
GlobalSize
GetExitCodeProcess
GetACP
lstrlenA
WriteFile
GetStdHandle
GlobalFree
VirtualAlloc
GetCommandLineA
CloseHandle
FindVolumeClose
GetEnvironmentVariableW
GetModuleHandleW
advapi32
RegQueryValueW
CloseEventLog
IsValidAcl
RegCreateKeyExW
ClearEventLogA
RegEnumKeyW
CreateServiceA
RegDeleteKeyA
IsValidSid
RegDeleteValueA
IsTextUnicode
ControlService
RegCloseKey
admparse
ResetAdmDirtyFlag
AdmClose
ResetAdmDirtyFlag
ResetAdmDirtyFlag
ResetAdmDirtyFlag
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 810KB - Virtual size: 810KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ