Static task
static1
Behavioral task
behavioral1
Sample
47f9800f7ac97c37dd8c386745daaed2c8aab15b29ec8a6b9c24384d480b4cb3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47f9800f7ac97c37dd8c386745daaed2c8aab15b29ec8a6b9c24384d480b4cb3.exe
Resource
win10v2004-20220812-en
General
-
Target
47f9800f7ac97c37dd8c386745daaed2c8aab15b29ec8a6b9c24384d480b4cb3
-
Size
297KB
-
MD5
35b6e425e64b229e1a9323fb9846b546
-
SHA1
c10e185a495e9743736ee6c01238492a3cb15296
-
SHA256
47f9800f7ac97c37dd8c386745daaed2c8aab15b29ec8a6b9c24384d480b4cb3
-
SHA512
8f3eb51f41b1764816a89abd7d297daf75df8db2d0040827404b96811b28fb629428d18cdc30d202090f9a9e5b63f0ce0a3c9b7fe4342def0baf34a386cc4961
-
SSDEEP
6144:QJAeH4vkg15b9vgwhYoG1IDHtE4PgSPgBtRYfn8JGBG:QJAeH4r5viIDa4PgSPkYfnO
Malware Config
Signatures
Files
-
47f9800f7ac97c37dd8c386745daaed2c8aab15b29ec8a6b9c24384d480b4cb3.exe windows x86
1915e076afab84402ce157a7db2f9159
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ReadConsoleA
HeapCreate
ReadFileEx
InterlockedDecrement
FindResourceW
SetEnvironmentVariableA
GetPrivateProfileIntA
ExitProcess
GetExitCodeProcess
lstrcpyW
InterlockedIncrement
LoadLibraryA
Heap32First
GetCurrentDirectoryA
CloseHandle
GetLastError
GetDiskFreeSpaceW
WaitForSingleObject
lstrcmpA
GetDiskFreeSpaceW
GetStringTypeW
adsldpc
ADsEnumAttributes
ADsExecuteSearch
ADsDeleteClassDefinition
ADsCloseSearchHandle
clbcatq
SetupOpen
CheckMemoryGates
SetSetupSave
CheckMemoryGates
DllGetClassObject
SetupOpen
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
SetSetupSave
CheckMemoryGates
DllGetClassObject
SetupOpen
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE