Static task
static1
Behavioral task
behavioral1
Sample
1a252aca8dd53842529529aff8eafa6ccb495a7c7efd0ef7b421bb8d34261b38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a252aca8dd53842529529aff8eafa6ccb495a7c7efd0ef7b421bb8d34261b38.exe
Resource
win10v2004-20220812-en
General
-
Target
1a252aca8dd53842529529aff8eafa6ccb495a7c7efd0ef7b421bb8d34261b38
-
Size
296KB
-
MD5
5ca14e99d748f71d726d813bf574b11e
-
SHA1
fb3eb15fb5d97236625591fd6511459019b8214f
-
SHA256
1a252aca8dd53842529529aff8eafa6ccb495a7c7efd0ef7b421bb8d34261b38
-
SHA512
be208be98964ee7b2ece5c0a2e5207b7e34406b4b23638168e6185a32dd2f6cf437bc908f39e15c81921174e14e4cc52969e3004ceabb458787eec38faa1a947
-
SSDEEP
6144:IoOeH4vkd5jIxRFKA5tl1mnLZrWz3ZnnW/Mq3gg+FGtFrKs0MjDTQP/6oHp:IfeH4K5jal4yW/MMnwGtFmsy3P
Malware Config
Signatures
Files
-
1a252aca8dd53842529529aff8eafa6ccb495a7c7efd0ef7b421bb8d34261b38.exe windows x86
ce168d9bf382ac1b34b61be16b33ded2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindResourceW
lstrcmpA
ReadFileEx
GetPrivateProfileIntA
GetLastError
GetCurrentDirectoryA
InterlockedDecrement
GetModuleHandleW
lstrcpyW
HeapCreate
ExitThread
LoadLibraryA
Heap32First
SetEnvironmentVariableA
GetStringTypeW
GetDiskFreeSpaceW
WaitForSingleObject
InterlockedIncrement
CloseHandle
GetDiskFreeSpaceW
GetExitCodeProcess
adsldpc
ADsCloseSearchHandle
ADsEnumAttributes
ADsExecuteSearch
ADsDeleteClassDefinition
clbcatq
DllGetClassObject
ComPlusMigrate
DllGetClassObject
CheckMemoryGates
SetSetupSave
SetupOpen
CheckMemoryGates
SetupOpen
ComPlusMigrate
ComPlusMigrate
CheckMemoryGates
SetupOpen
SetSetupSave
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ