Static task
static1
Behavioral task
behavioral1
Sample
b9f8fbecf811bd548713689b1332a0ad8e5e7b480b2eff6bda1a377d27f7f2fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9f8fbecf811bd548713689b1332a0ad8e5e7b480b2eff6bda1a377d27f7f2fb.exe
Resource
win10v2004-20220812-en
General
-
Target
b9f8fbecf811bd548713689b1332a0ad8e5e7b480b2eff6bda1a377d27f7f2fb
-
Size
820KB
-
MD5
282bd096a23b9f57da05375d79d48184
-
SHA1
af3ff0b5cbd18c557d1a7f3581993cbef5c3cfad
-
SHA256
b9f8fbecf811bd548713689b1332a0ad8e5e7b480b2eff6bda1a377d27f7f2fb
-
SHA512
94002a0a97075df85d0ca3df3f3e7ee6edc6dda33c85460d322b9aacf344c2a4f71d61bb2df4a6e27e9d1b142ecdfd3d057eeffc40c70dca18486de53a679cb7
-
SSDEEP
24576:BeUTHqRmqgXRVvL/qd3LR6gWauo82QvOGvm:8UDqoL/UbRuocvOx
Malware Config
Signatures
Files
-
b9f8fbecf811bd548713689b1332a0ad8e5e7b480b2eff6bda1a377d27f7f2fb.exe windows x86
5b8c9c1caab801c61c26006498d5737d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
VirtualAlloc
CreateMutexA
lstrlenA
GetACP
GetModuleHandleW
GetStdHandle
LocalFree
GlobalSize
GetEnvironmentVariableW
GetExitCodeProcess
GlobalFree
WriteFile
CloseHandle
GetPrivateProfileIntW
InterlockedExchange
FindVolumeClose
ResetEvent
ResumeThread
CreateEventA
advapi32
CloseEventLog
RegCreateKeyExW
CreateServiceA
IsValidSid
RegDeleteValueA
IsTextUnicode
RegDeleteKeyA
IsValidAcl
RegCloseKey
RegEnumKeyW
ControlService
RegQueryValueW
ClearEventLogA
admparse
ResetAdmDirtyFlag
ResetAdmDirtyFlag
ResetAdmDirtyFlag
ResetAdmDirtyFlag
ResetAdmDirtyFlag
hdwwiz.cpl
InstallNewDevice
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 811KB - Virtual size: 810KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ