Static task
static1
Behavioral task
behavioral1
Sample
bc32c6834dcf82faf46417f750d2c27da2056394ac9787aaed4d6c2eccdfc1ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc32c6834dcf82faf46417f750d2c27da2056394ac9787aaed4d6c2eccdfc1ca.exe
Resource
win10v2004-20220812-en
General
-
Target
bc32c6834dcf82faf46417f750d2c27da2056394ac9787aaed4d6c2eccdfc1ca
-
Size
342KB
-
MD5
3eece758f81ae1cbe352a435f37ba950
-
SHA1
d87dba102373a82c5f929145fa7b6d6d71d800c4
-
SHA256
bc32c6834dcf82faf46417f750d2c27da2056394ac9787aaed4d6c2eccdfc1ca
-
SHA512
87a1d7c0af5c5560c81b5e1aca81b88de73bcad5c65d7a0f1c36971e78f38465de000c54ad6815729780375a26e52c7cdc69880608767c0aea2719f5d3d0acbf
-
SSDEEP
6144:fuK7J5pRiGr1KaJpQaE7EvMdKB/gRaKdliOhPM4lluzlwUdYmorDAEN:fueLiu1Kr+jZyE4yV4AEN
Malware Config
Signatures
Files
-
bc32c6834dcf82faf46417f750d2c27da2056394ac9787aaed4d6c2eccdfc1ca.exe windows x86
46e39b92235a12b19297c093634d68d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CloseHandle
WriteConsoleA
lstrlenA
GetCommandLineA
GetTimeFormatW
EnumResourceTypesA
GetDriveTypeW
GetModuleHandleA
TlsGetValue
SetLastError
GlobalFlags
HeapDestroy
GetStartupInfoA
HeapCreate
CloseHandle
GetFileAttributesW
GetConsoleTitleA
GetEnvironmentVariableA
CreateEventW
advapi32
IsValidSecurityDescriptor
RegCreateKeyExW
IsValidSid
IsValidSid
InitializeSid
RegEnumKeyA
IsValidSid
IsValidSid
CreateProcessAsUserW
RegQueryValueW
IsValidSid
RegDeleteValueA
IsValidAcl
cnvfat
ConvertFAT
ConvertFAT
ConvertFAT
ConvertFAT
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ