Static task
static1
Behavioral task
behavioral1
Sample
745934effbc966f5798c4de1f854bd5e6fe68029a038939fce5fe41c80ec9d16.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
745934effbc966f5798c4de1f854bd5e6fe68029a038939fce5fe41c80ec9d16.exe
Resource
win10v2004-20221111-en
General
-
Target
745934effbc966f5798c4de1f854bd5e6fe68029a038939fce5fe41c80ec9d16
-
Size
510KB
-
MD5
e60b6227885bd43c89a5f53e4aebb423
-
SHA1
14f836f51079d079ca60d814cc31909cb8b6c2fa
-
SHA256
745934effbc966f5798c4de1f854bd5e6fe68029a038939fce5fe41c80ec9d16
-
SHA512
1adc0951e46e619aa2f2efe5559be83d2debd9aabb71d85e93a12491ebcd9934217bbd5d0b840ab2017d1fc1695cb10d5a9800cfbb55a8150b18c55d5ad2899c
-
SSDEEP
12288:Fp8qnVRAEbAqh9yyuvBY8crF8eDeLmRRB0EDq2:Fp8qVRAEEqhwyuvBA6mBnDJ
Malware Config
Signatures
Files
-
745934effbc966f5798c4de1f854bd5e6fe68029a038939fce5fe41c80ec9d16.exe windows x86
100b890ab18a1e8aa2dba3c43866d6ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
FileTimeToSystemTime
SuspendThread
CreateEventW
WriteConsoleA
HeapCreate
FindVolumeClose
HeapDestroy
GlobalFlags
CreateSemaphoreA
GetCommandLineA
GetEnvironmentVariableA
DeleteFileA
EnumResourceTypesW
GetStartupInfoA
lstrlenA
CloseHandle
CloseHandle
GetModuleHandleA
SetLastError
advapi32
IsValidSid
CloseEventLog
CreateServiceW
IsValidSid
IsValidSid
IsValidSid
IsValidAcl
RegEnumKeyA
RegDeleteValueA
ControlService
IsValidSid
InitializeSid
RegCreateKeyExW
ddrawex
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ