Static task
static1
Behavioral task
behavioral1
Sample
ac01497b77a4fb5191fa77738ccec9d6719d7f576ffdc9020843dda7960bc64e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac01497b77a4fb5191fa77738ccec9d6719d7f576ffdc9020843dda7960bc64e.exe
Resource
win10v2004-20221111-en
General
-
Target
ac01497b77a4fb5191fa77738ccec9d6719d7f576ffdc9020843dda7960bc64e
-
Size
3KB
-
MD5
445ab0183e5e534ba8176d45eff457b8
-
SHA1
e1129e1a0164a3e897e99ea7fde22d7da40f2d37
-
SHA256
ac01497b77a4fb5191fa77738ccec9d6719d7f576ffdc9020843dda7960bc64e
-
SHA512
5b0daf2aa70813ab45cbbf74b219d304e6b4e1c31cc975c952bbe858cb6bac4f345c8ac8c2ce070cc5b16af2fd6f169c3f3aee9c50cbcff0dc4b291972916747
Malware Config
Signatures
Files
-
ac01497b77a4fb5191fa77738ccec9d6719d7f576ffdc9020843dda7960bc64e.exe windows x86
a638140ed3170d61f7337d7e2a4d85d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
kernel32
CloseHandle
CreateToolhelp32Snapshot
DuplicateHandle
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessIoCounters
MoveFileExA
OpenProcess
Process32First
Process32Next
TerminateProcess
VirtualAlloc
VirtualFree
lstrcmpiA
lstrlenW
user32
CharUpperW
Sections
.text Size: 1024B - Virtual size: 994B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 694B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 697B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE