Static task
static1
Behavioral task
behavioral1
Sample
b37e4fa27901fe45a26a5483368e1c0a3e1777536c5a3a9f09dd04336ae43465.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b37e4fa27901fe45a26a5483368e1c0a3e1777536c5a3a9f09dd04336ae43465.exe
Resource
win10v2004-20220812-en
General
-
Target
b37e4fa27901fe45a26a5483368e1c0a3e1777536c5a3a9f09dd04336ae43465
-
Size
16KB
-
MD5
f8cffe3c7489b71ee9a5c0b2f335ff3e
-
SHA1
1c5629d33db752a2056ba723c6d19696d41a8a2c
-
SHA256
b37e4fa27901fe45a26a5483368e1c0a3e1777536c5a3a9f09dd04336ae43465
-
SHA512
bc6c1d5a62f9146a6c9374f2c300b8caa2c0695006464e52dbedc82d3e56725db1288c46030773296618937327953dcd4a13c50bd04a7f1e93ff24f08c9de377
-
SSDEEP
192:wVEIu/1uMkW9FGJJu9advZC7Jj19CocHh6G9:aEIeToZC7l1xcBv
Malware Config
Signatures
Files
-
b37e4fa27901fe45a26a5483368e1c0a3e1777536c5a3a9f09dd04336ae43465.exe windows x86
45549e95c3cf10155b144e1c78ad3c8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
RtlZeroMemory
GetProcAddress
Sleep
VirtualProtect
WriteProcessMemory
GetModuleHandleA
GetModuleFileNameA
GetCurrentProcess
ExitProcess
SetSystemTime
advapi32
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 622B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE