Static task
static1
Behavioral task
behavioral1
Sample
58af070595e3644ac5546b0e6527102dacd5a7798c8008ae077969536d1a022e.exe
Resource
win7-20220812-en
General
-
Target
58af070595e3644ac5546b0e6527102dacd5a7798c8008ae077969536d1a022e
-
Size
83KB
-
MD5
eabf703b5350fe9b3a5a11348972e7c6
-
SHA1
0b5d07610aa1ef705baa1d9cac765bc34deefab7
-
SHA256
58af070595e3644ac5546b0e6527102dacd5a7798c8008ae077969536d1a022e
-
SHA512
fccc7c1f84c5f5e3da839dcb8cc57875ea26ac90a7f0c0721e5c320e404b9e35941d55b173a9b4144905f1670e48f69eb549704d916cce0f9538e51e5257bb4d
-
SSDEEP
1536:B3nGYbxy7cLyrfwyzjOnEI20FSl5MhoEeQQ6wMeAG5m6y36c:B3Gyxy7cLUoyzjOER0FmMhoxX6AAGA6g
Malware Config
Signatures
Files
-
58af070595e3644ac5546b0e6527102dacd5a7798c8008ae077969536d1a022e.exe windows x86
8a50a218a17d08a5b56c4e5f0c0103a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetModuleFileNameA
GetModuleHandleA
FreeResource
WriteFile
LoadResource
SizeofResource
FindResourceA
GetCurrentProcess
GetProcAddress
GetFileSize
ReadFile
SetFilePointer
CreateProcessA
SetFileTime
GetFileTime
ExitProcess
GetTickCount
CloseHandle
FindFirstFileA
GetWindowsDirectoryA
FindClose
user32
wsprintfA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegSetValueExA
RegOpenKeyExA
LookupPrivilegeValueA
msvcrt
strcpy
strcat
strlen
strchr
sprintf
memcpy
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 412B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ