Static task
static1
Behavioral task
behavioral1
Sample
9259e5481428e7d7ce1436ec398d521bbdeb04d76b504bf4d20c90584879930e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9259e5481428e7d7ce1436ec398d521bbdeb04d76b504bf4d20c90584879930e.exe
Resource
win10v2004-20220812-en
General
-
Target
9259e5481428e7d7ce1436ec398d521bbdeb04d76b504bf4d20c90584879930e
-
Size
88KB
-
MD5
70b90869ec2f55cd8af7104334185cba
-
SHA1
9ebb9e5fbf0f9c4c2d99a59eb4ae0daccf5f6bb0
-
SHA256
9259e5481428e7d7ce1436ec398d521bbdeb04d76b504bf4d20c90584879930e
-
SHA512
fceb8abb8856cd65f0f610b424a7b0eddcea568e832eea66b8f9b65feda769b241c0d65e42fb107517b5cb10395a63acc1fc6113934f7190964aa294b8734453
-
SSDEEP
768:FOU1thkE22rPtfrtHyeTHwnQXbqkh4WSL/GnKoNve+R9Zy2c7GJXYAcScI5+:FOU1s2fxAKhBOuKo9l/c70Yu
Malware Config
Signatures
Files
-
9259e5481428e7d7ce1436ec398d521bbdeb04d76b504bf4d20c90584879930e.exe windows x86
ce7eb4de66318acda8929f5824b53086
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
CloseHandle
GetDiskFreeSpaceExA
TlsGetValue
GetDriveTypeW
DeleteCriticalSection
GetDateFormatA
VirtualProtect
IsBadCodePtr
EnumResourceTypesA
IsBadReadPtr
PulseEvent
GetModuleHandleA
GetCommandLineA
GetLastError
FreeConsole
LoadLibraryExW
Sleep
LocalFree
SetLastError
advapi32
AccessCheck
RegCloseKey
RegCreateKeyExA
GetFileSecurityA
LsaFreeMemory
CloseTrace
OpenEventLogA
LsaSetSecret
IsValidSid
LsaClose
FreeSid
CloseEventLog
RegLoadKeyA
RegCloseKey
clbcatq
GetComputerObject
DowngradeAPL
GetCatalogObject
ComPlusMigrate
SetSetupOpen
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE