Static task
static1
Behavioral task
behavioral1
Sample
7cc952152b908399938ba80a0c05d5d21ed9473baa7bbd0344836904c1f0ba24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7cc952152b908399938ba80a0c05d5d21ed9473baa7bbd0344836904c1f0ba24.exe
Resource
win10v2004-20221111-en
General
-
Target
7cc952152b908399938ba80a0c05d5d21ed9473baa7bbd0344836904c1f0ba24
-
Size
293KB
-
MD5
3f9cbf930f0186498708407ad93c19d4
-
SHA1
1a67eacd7e4f0a762423e71c3935f85b3d42a552
-
SHA256
7cc952152b908399938ba80a0c05d5d21ed9473baa7bbd0344836904c1f0ba24
-
SHA512
0e018c01a8d8cfe4dbb9c79084ef65816843591f5f3f6402200ee628eaeafb2ab31b522d3acffc5302c680e12649efb7f5df9287337119677ddd8b6f858df20e
-
SSDEEP
6144:cNYgT+eTfWYNBhvciUMQuSLC96BudaYg16OARwbGsmvkq/46MNGBmBXUpev:cbT5Tu21qbC96Nx16WKsUkqgFqmGq
Malware Config
Signatures
Files
-
7cc952152b908399938ba80a0c05d5d21ed9473baa7bbd0344836904c1f0ba24.exe windows x86
5dc555a36039eb995077b3b38df83183
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
EnumResourceTypesW
CloseHandle
lstrlenA
HeapDestroy
WriteConsoleA
CreateSemaphoreA
SetLastError
GetModuleHandleA
HeapCreate
GetCommandLineA
GlobalFlags
FileTimeToSystemTime
GetEnvironmentVariableA
CreateEventW
SuspendThread
GetCommandLineA
DeleteFileA
CloseHandle
GetStartupInfoA
advapi32
IsValidSid
RegCreateKeyExW
InitializeSid
CreateServiceW
IsValidSid
ControlService
IsValidSid
IsValidAcl
RegDeleteValueA
IsValidSid
IsValidSid
CloseEventLog
RegEnumKeyA
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 428KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ