Static task
static1
Behavioral task
behavioral1
Sample
c918e68288f7a1b4dba93932b4bce043336b17822be2c22a676cf1fd96726e48.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c918e68288f7a1b4dba93932b4bce043336b17822be2c22a676cf1fd96726e48.exe
Resource
win10v2004-20221111-en
General
-
Target
c918e68288f7a1b4dba93932b4bce043336b17822be2c22a676cf1fd96726e48
-
Size
9KB
-
MD5
92f3f3065ad3842327225cb4df5e3293
-
SHA1
781d51425126801a7cc1725ec888646c1d41d01f
-
SHA256
c918e68288f7a1b4dba93932b4bce043336b17822be2c22a676cf1fd96726e48
-
SHA512
feb7ca0d95b37575037a0856021e84f1df8ca65a2e8f3adfd16e14068b470b40b119b660d360d386f9cb4d96b3f8d3e34c681134fbf2fa9ee56cd6f4612fb63b
-
SSDEEP
192:+eN/wCkRLkdaDlMF5hswq2RR9DOwZekpNI3Bc97zJWn8I8BSaW:+eN/xUXqR9LZekpN59JWn8I8BBW
Malware Config
Signatures
Files
-
c918e68288f7a1b4dba93932b4bce043336b17822be2c22a676cf1fd96726e48.exe windows x86
5d5721fc3fa79c370f885a451a9abcce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
lstrcatA
GetModuleFileNameA
CloseHandle
CreateFileA
CreateFileMappingA
ExitProcess
GetCurrentProcess
GetFileSize
lstrlenA
lstrcpyA
GetProcAddress
WriteFile
UnmapViewOfFile
ReadFile
MapViewOfFile
LocalFree
LocalAlloc
LoadLibraryA
GlobalFree
GlobalAlloc
GetLastError
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
advapi32
RegOpenKeyA
LookupPrivilegeValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AdjustTokenPrivileges
RegEnumValueA
RegCloseKey
OpenProcessToken
shlwapi
StrStrIA
wsock32
send
recv
WSAStartup
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE