Static task
static1
Behavioral task
behavioral1
Sample
299cb17fa18ad97b39496cb03b7ee6c1a38b8c9050f90ec8ea6517f0ad8487b5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
299cb17fa18ad97b39496cb03b7ee6c1a38b8c9050f90ec8ea6517f0ad8487b5.exe
Resource
win10v2004-20221111-en
General
-
Target
299cb17fa18ad97b39496cb03b7ee6c1a38b8c9050f90ec8ea6517f0ad8487b5
-
Size
297KB
-
MD5
c07248e38d243ffde8699c06ca79cd39
-
SHA1
3859fbaf9c115aed54bcf6c77930487eb99bee82
-
SHA256
299cb17fa18ad97b39496cb03b7ee6c1a38b8c9050f90ec8ea6517f0ad8487b5
-
SHA512
327262039c83edbf5719208d38f5fa77ae48f3bd1c7ebba2425a68e8636b594edd58a5144cb064a328632c1077686111e302df5b610f60767c61af48f5306c97
-
SSDEEP
6144:s2eH4vk/hvF7gKKBTJWaJmL9uAFbdPi7+1PWW8jJ8lqI6bJMeB:s2eH4MhvF7pa1mxxFBJxqjWlqIgJMM
Malware Config
Signatures
Files
-
299cb17fa18ad97b39496cb03b7ee6c1a38b8c9050f90ec8ea6517f0ad8487b5.exe windows x86
f7b772594079c7f8f5b6e7de0121f6fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LoadLibraryA
GetDiskFreeSpaceW
GetStringTypeW
ReadFileEx
HeapCreate
GetDiskFreeSpaceW
GetCurrentDirectoryA
GetExitCodeProcess
GetPrivateProfileIntA
WaitForSingleObject
CloseHandle
GetLastError
lstrcmpA
InterlockedIncrement
ExitProcess
FindResourceW
Heap32First
lstrcpyW
SetEnvironmentVariableA
ReadConsoleA
InterlockedDecrement
adsldpc
ADsCloseSearchHandle
ADsEnumAttributes
ADsExecuteSearch
ADsDeleteClassDefinition
clbcatq
SetupOpen
ComPlusMigrate
SetupOpen
DllGetClassObject
SetSetupSave
SetupOpen
ComPlusMigrate
CheckMemoryGates
CheckMemoryGates
SetSetupSave
ComPlusMigrate
CheckMemoryGates
DllGetClassObject
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE