Static task
static1
Behavioral task
behavioral1
Sample
add1035547275a7f7b7ff753a19e48d75b96361560463f33484e17993e5b41e0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
add1035547275a7f7b7ff753a19e48d75b96361560463f33484e17993e5b41e0.exe
Resource
win10v2004-20220812-en
General
-
Target
add1035547275a7f7b7ff753a19e48d75b96361560463f33484e17993e5b41e0
-
Size
745KB
-
MD5
adb2202b79a9efc778dc2933f1f0353c
-
SHA1
1dca3fe5935369cfea6d0b254ef09be1e6410246
-
SHA256
add1035547275a7f7b7ff753a19e48d75b96361560463f33484e17993e5b41e0
-
SHA512
99281a2aec3773a7003b97b204c8cfa1df272cd28094aa0927e04f8cd013684c28076ab8c6845e0ffd086e25aa324f98775ea01dee24c45709f3b5da416fb548
-
SSDEEP
12288:s+L6G/qz6FE+MtHnaSYJelwPIYxEw09G2dd2P2FkSv7yRpnj3eVD/U+PRvSjbkge:s+WGCajM8ranYxhCGOdGkk07Ao/PEv/e
Malware Config
Signatures
Files
-
add1035547275a7f7b7ff753a19e48d75b96361560463f33484e17993e5b41e0.exe windows x86
79266c3e759aecb68dd02a14e76a21cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetTempPathA
CreateHardLinkA
DeleteCriticalSection
ReleaseMutex
GetDriveTypeA
AddAtomA
ExitProcess
GetStartupInfoA
GetPrivateProfileStringW
GetTickCount
IsValidCodePage
GetLastError
CloseHandle
HeapDestroy
GetModuleHandleA
SetEvent
VirtualProtect
HeapSize
ResumeThread
DeleteTimerQueue
advapi32
IsValidSid
GetFileSecurityA
LsaClose
AccessCheck
RegQueryValueExA
RegCloseKey
LsaSetSecret
RegEnumValueA
IsWellKnownSid
RegEnumKeyExA
CloseTrace
LsaFreeMemory
GetSecurityInfo
RegLoadKeyA
FreeSid
RegCreateKeyExA
CloseEventLog
OpenEventLogA
urlmon
CoInternetCompareUrl
CoInternetGetSession
CoInternetParseUrl
CoInstall
CopyBindInfo
perfos
CloseOSObject
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE