Static task
static1
Behavioral task
behavioral1
Sample
bead06432ab49e4d5c57a558785cf4478c36492d910521d64d9ded0c05ad664a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bead06432ab49e4d5c57a558785cf4478c36492d910521d64d9ded0c05ad664a.exe
Resource
win10v2004-20221111-en
General
-
Target
bead06432ab49e4d5c57a558785cf4478c36492d910521d64d9ded0c05ad664a
-
Size
9KB
-
MD5
20fc49414d59d6ee7e7b453e0683ed9e
-
SHA1
b5bbc5bbac49255c4a91a1e564beaaeffd2d2a8b
-
SHA256
bead06432ab49e4d5c57a558785cf4478c36492d910521d64d9ded0c05ad664a
-
SHA512
6a8fb69726dffb1bde72911fd4256f47276e8d99c2bef417804c755a784f8c0d86ed153b5f680ceb94f4a8cf571dc14a07802868d8e825de203fd06f8df57999
-
SSDEEP
192:uHKdKgXA2B/yHuH6ZektdW3Bc9YnJWn8I8BSaW:uHKdKgXA2BKZektdT9eWn8I8BBW
Malware Config
Signatures
Files
-
bead06432ab49e4d5c57a558785cf4478c36492d910521d64d9ded0c05ad664a.exe windows x86
93b5029f33eab48d822b686f7ed72fd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
WriteFile
GetModuleFileNameA
CloseHandle
CreateFileA
CreateFileMappingA
ExitProcess
GetCurrentProcess
GetFileSize
lstrlenA
lstrcpyA
lstrcatA
GetProcAddress
UnmapViewOfFile
Sleep
SetFilePointer
ReadFile
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryA
GlobalFree
GlobalAlloc
GetLastError
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
advapi32
RegOpenKeyA
LookupPrivilegeValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegCloseKey
OpenProcessToken
shlwapi
StrStrIA
wsock32
send
recv
WSAStartup
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE