Static task
static1
Behavioral task
behavioral1
Sample
547b156c0f6a971bad7cdac3bbe698149b202506bb99285e9be1d143492bae6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
547b156c0f6a971bad7cdac3bbe698149b202506bb99285e9be1d143492bae6e.exe
Resource
win10v2004-20221111-en
General
-
Target
547b156c0f6a971bad7cdac3bbe698149b202506bb99285e9be1d143492bae6e
-
Size
296KB
-
MD5
110f38b21db691151644c1708de2fce0
-
SHA1
0cebdb821301cf2c3c6c1bdbda7c7e0b6776180a
-
SHA256
547b156c0f6a971bad7cdac3bbe698149b202506bb99285e9be1d143492bae6e
-
SHA512
e61c7c5def467be01d637f507a19840878a86c2b0b17e4e6a46d887d9d4e73286b9e6d402e2e2910d7752cbcc222295fd00e2c9ccae0296e2e4637839b506757
-
SSDEEP
6144:sZeH4vkZnYjYRUpc5i/W3iV3q49XrwlpZi9SyidQGPRRhYvU6:KeH4Jc8V3qoXOzGSyUQsRhYV
Malware Config
Signatures
Files
-
547b156c0f6a971bad7cdac3bbe698149b202506bb99285e9be1d143492bae6e.exe windows x86
ddf898293a1dd318090262773d237e3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetDiskFreeSpaceW
lstrcmpA
ReadFileEx
Heap32First
GetStringTypeW
HeapCreate
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetCurrentDirectoryA
lstrcpyW
FindResourceW
WaitForSingleObject
GetLastError
GetPrivateProfileIntA
LoadLibraryA
SetEnvironmentVariableA
GetExitCodeProcess
ExitThread
GetDiskFreeSpaceW
GetModuleHandleW
adsldpc
ADsExecuteSearch
ADsDeleteClassDefinition
ADsCloseSearchHandle
ADsEnumAttributes
clbcatq
CheckMemoryGates
CheckMemoryGates
SetSetupSave
ComPlusMigrate
CheckMemoryGates
ComPlusMigrate
SetupOpen
SetupOpen
SetupOpen
ComPlusMigrate
DllGetClassObject
SetSetupSave
DllGetClassObject
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ