Static task
static1
Behavioral task
behavioral1
Sample
bcad26efb303a17380e5d09c4d3a05aec0ac41ca676293a56a5a3148208ecdc0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcad26efb303a17380e5d09c4d3a05aec0ac41ca676293a56a5a3148208ecdc0.exe
Resource
win10v2004-20221111-en
General
-
Target
bcad26efb303a17380e5d09c4d3a05aec0ac41ca676293a56a5a3148208ecdc0
-
Size
296KB
-
MD5
895a01d817dee679e405287a9796f892
-
SHA1
0859f59983f67305ddd5a1f721fb99ecd81e1882
-
SHA256
bcad26efb303a17380e5d09c4d3a05aec0ac41ca676293a56a5a3148208ecdc0
-
SHA512
13d2074262be64f7917a547f7e74fb584afc730b77e34f73f6ccaff14b2fa3e56dc8f268f16d0f345b42a3b83a69beba4714ebed60673e8ebaba77a7b2afd33a
-
SSDEEP
6144:/oieH4vkqmOPD7ZOXrdZiLOJ8hmtZHNAZFTWJx+pS+atbSynDvI:/oieH4ZmOB6kRmtfAZ4Jx+cv2ynDvI
Malware Config
Signatures
Files
-
bcad26efb303a17380e5d09c4d3a05aec0ac41ca676293a56a5a3148208ecdc0.exe windows x86
4ad5f03bef00e1acb7d90c14938a48cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
Heap32First
lstrcpyW
CloseHandle
InterlockedIncrement
DeviceIoControl
CreateEventW
SetEnvironmentVariableA
LoadLibraryA
GetPrivateProfileIntA
GetStringTypeW
ExitProcess
GetDiskFreeSpaceW
ReadConsoleA
lstrcmpA
WaitForSingleObject
GetDiskFreeSpaceW
ReadFileEx
FindResourceW
InterlockedDecrement
HeapCreate
GetLastError
adsldpc
ADsDeleteClassDefinition
ADsCloseSearchHandle
ADsExecuteSearch
ADsEnumAttributes
clbcatq
SetSetupSave
SetupOpen
CheckMemoryGates
CheckMemoryGates
SetSetupSave
CheckMemoryGates
SetupOpen
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
DllGetClassObject
SetupOpen
ComPlusMigrate
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ