Static task
static1
Behavioral task
behavioral1
Sample
47e38272838011067db995b134be2bb604e437349d13c16060c16e14a2bb3608.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47e38272838011067db995b134be2bb604e437349d13c16060c16e14a2bb3608.exe
Resource
win10v2004-20221111-en
General
-
Target
47e38272838011067db995b134be2bb604e437349d13c16060c16e14a2bb3608
-
Size
3KB
-
MD5
60c8948015669865f8d17bcf87ba3b71
-
SHA1
0491225b7575ef0f9406013c49bee034eefcf0a5
-
SHA256
47e38272838011067db995b134be2bb604e437349d13c16060c16e14a2bb3608
-
SHA512
6ed8955f19dfd028f50e01df3f16adad82a612adf7289d099e3737f1da4bb6bec877483686d4ba5debb14fd003045bd14f96e456e2ee8efae295f70ad7a4ec29
Malware Config
Signatures
Files
-
47e38272838011067db995b134be2bb604e437349d13c16060c16e14a2bb3608.exe windows x86
9bab55a8b8c3bde7008376ee33b0b7a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetCurrentProcess
FormatMessageA
GetLastError
LocalFree
advapi32
OpenProcessToken
LookupPrivilegeValueW
InitiateSystemShutdownW
AdjustTokenPrivileges
shell32
CommandLineToArgvW
crtdll
fflush
fprintf
_iob
fputs
exit
user32
CharToOemA
Sections
.text Size: 1024B - Virtual size: 659B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 818B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ