Static task
static1
Behavioral task
behavioral1
Sample
034761bf453ddd87c60ebea7b707b49e9a6e409f2518bca842334d6d0c9f93b4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
034761bf453ddd87c60ebea7b707b49e9a6e409f2518bca842334d6d0c9f93b4.exe
Resource
win10v2004-20220812-en
General
-
Target
034761bf453ddd87c60ebea7b707b49e9a6e409f2518bca842334d6d0c9f93b4
-
Size
297KB
-
MD5
66e3e33ba97e2884719ffe44c308e555
-
SHA1
9cf9ec0b4ec513fbab441438c4b7ae9f356540b6
-
SHA256
034761bf453ddd87c60ebea7b707b49e9a6e409f2518bca842334d6d0c9f93b4
-
SHA512
e6384ba9291dfc4b53df878bdb5b321c44f616d4b926c059cc25a21adfcae353075029a0c82d22dcc2751b00263cc796527c434cee13797eef28946f6f9a130a
-
SSDEEP
6144:HZeH4vkf73ZfySaTGgzjq6VncF/h4AXL0JHeXrRA7MRMb2:5eH4S3PaTGga6G+y+jc9
Malware Config
Signatures
Files
-
034761bf453ddd87c60ebea7b707b49e9a6e409f2518bca842334d6d0c9f93b4.exe windows x86
0ed543fa47f281890837d0320a3faf39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLastError
GetPrivateProfileIntA
lstrcpyW
lstrcmpA
Heap32First
ReadConsoleA
FindResourceW
SetEnvironmentVariableA
ExitProcess
GetCurrentDirectoryA
HeapCreate
LoadLibraryA
GetDiskFreeSpaceW
WaitForSingleObject
InterlockedDecrement
CloseHandle
InterlockedIncrement
GetStringTypeW
GetDiskFreeSpaceW
ReadFileEx
GetExitCodeProcess
adsldpc
ADsEnumAttributes
ADsCloseSearchHandle
ADsDeleteClassDefinition
ADsExecuteSearch
clbcatq
CheckMemoryGates
ComPlusMigrate
CheckMemoryGates
CheckMemoryGates
SetSetupSave
DllGetClassObject
DllGetClassObject
SetSetupSave
SetupOpen
SetupOpen
SetupOpen
ComPlusMigrate
ComPlusMigrate
version
VerFindFileA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE