Static task
static1
Behavioral task
behavioral1
Sample
f73c5ddbf8976ae74314e81eaf915b90be305bba54ef3fac03dc463e663dead4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f73c5ddbf8976ae74314e81eaf915b90be305bba54ef3fac03dc463e663dead4.exe
Resource
win10v2004-20221111-en
General
-
Target
f73c5ddbf8976ae74314e81eaf915b90be305bba54ef3fac03dc463e663dead4
-
Size
870KB
-
MD5
1c1479914e239d3e8554a06ffef917dc
-
SHA1
3816a890ed0fc7fff1fbd3b326a4521e319c245c
-
SHA256
f73c5ddbf8976ae74314e81eaf915b90be305bba54ef3fac03dc463e663dead4
-
SHA512
690a7bf2cd1b2a4f120caf1dfa140750f7b484efd1816c6907af959710e1bdee42979347bb45cc68b038917515c71175a0e113db147f8639cb9809825d1aa6e0
-
SSDEEP
12288:duJKWad++caj2dhMCqMF4fCTYZBfuEMkiyonS2Sjf29xuk2VJn81cRt4w:E+3ifjpgBG1xyh20iukkcu6
Malware Config
Signatures
Files
-
f73c5ddbf8976ae74314e81eaf915b90be305bba54ef3fac03dc463e663dead4.exe windows x86
9a27e7954b9f9fd42b381a39bec36d4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
ResetEvent
GetModuleFileNameA
IsBadStringPtrA
GetEnvironmentVariableA
ResumeThread
CreateFileA
CancelIo
HeapCreate
SetEvent
GetStartupInfoA
TlsAlloc
GetModuleHandleA
ReleaseMutex
GetCommandLineW
GetStdHandle
CreateFileMappingA
TlsGetValue
lstrlenA
HeapDestroy
advapi32
InitializeSid
ControlService
RegDeleteValueA
RegCreateKeyExW
CreateProcessAsUserA
ClearEventLogW
IsValidSid
IsTextUnicode
CreateServiceW
RegEnumKeyA
IsValidSecurityDescriptor
RegQueryValueW
IsValidAcl
unimdmat
UmCloseModem
UmCloseModem
UmCloseModem
UmCloseModem
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 862KB - Virtual size: 861KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ