Static task
static1
Behavioral task
behavioral1
Sample
e0244364338fd9646766ea80ba5892d03e2b85450c3ac6ed230dc986b852aa80.exe
Resource
win10-20220414-en
General
-
Target
e0244364338fd9646766ea80ba5892d03e2b85450c3ac6ed230dc986b852aa80
-
Size
764KB
-
MD5
8a692d1ed34bb21a882658d8c4743211
-
SHA1
c9c405fdb3414653b972578607dbc819296ec5d6
-
SHA256
e0244364338fd9646766ea80ba5892d03e2b85450c3ac6ed230dc986b852aa80
-
SHA512
a35f46c71009e0d0cefb4311e0112a9b3fe566210a209fa169a5ddac4d477122c2f9ca2cdb7927d83d416008f95b11671132752014fdfb4f4bb7b059f7d8623b
-
SSDEEP
12288:1O0XqBWMqOQYN/hpbSX1y6ghTcLoCTKYKqHVWi06KmhSEICSgn/yERFKsUO1:40XPlOQYv9sXgOLoWwipK3ErDvR1
Malware Config
Signatures
Files
-
e0244364338fd9646766ea80ba5892d03e2b85450c3ac6ed230dc986b852aa80.exe windows x86
c4fe96246b42ed89eba209a1ad1599eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
GetCurrentProcess
SetDefaultCommConfigW
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
SetConsoleMode
GetGeoInfoA
GetSystemDirectoryA
GetBinaryTypeW
lstrcmpW
GetShortPathNameA
LCMapStringA
MoveFileExW
GetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
GetModuleFileNameA
GetCommTimeouts
FreeLibrary
InterlockedIncrement
FindResourceA
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapFree
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
RaiseException
CreateFileW
CloseHandle
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
Sections
.text Size: 653KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jup Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hiziv Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.naj Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ