Static task
static1
Behavioral task
behavioral1
Sample
c8b59ddd5ec5848bb32768c7da719695658bee3487e4529e22a4782f6de1cc83.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8b59ddd5ec5848bb32768c7da719695658bee3487e4529e22a4782f6de1cc83.exe
Resource
win10v2004-20220901-en
General
-
Target
c8b59ddd5ec5848bb32768c7da719695658bee3487e4529e22a4782f6de1cc83
-
Size
870KB
-
MD5
9e78debfeb869e8a981824dcdb222531
-
SHA1
2351a165acf41ea2a28ac8bc651b9a65dcd3aa63
-
SHA256
c8b59ddd5ec5848bb32768c7da719695658bee3487e4529e22a4782f6de1cc83
-
SHA512
6cdce735104023e77282a47fdd2ed556d778f100cb73e270d5d2fc93699683bebb3a8a059865ec44afdda4419cfc548cf95a0ba1766e45076813df9047823457
-
SSDEEP
24576:r6UCTiDCmC51WuVctI1XM9sP3UmUK3xQ:r6Uuw4xGi42u
Malware Config
Signatures
Files
-
c8b59ddd5ec5848bb32768c7da719695658bee3487e4529e22a4782f6de1cc83.exe windows x86
a523390888b257b6b5e3c6005d563970
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetACP
IsBadCodePtr
SetEvent
GetStdHandle
HeapCreate
ReleaseMutex
GetStartupInfoA
HeapDestroy
GetCommandLineW
SetLastError
ResetEvent
GetModuleFileNameA
GetEnvironmentVariableA
lstrlenA
CreateFileMappingA
CancelIo
TlsAlloc
TlsGetValue
GetModuleHandleA
advapi32
InitializeSid
RegEnumKeyA
RegCreateKeyExW
CreateProcessAsUserA
IsValidSid
RegQueryValueW
CreateServiceW
ClearEventLogW
IsTextUnicode
RegDeleteValueA
IsValidSecurityDescriptor
IsValidAcl
ControlService
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 862KB - Virtual size: 861KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ