Static task
static1
Behavioral task
behavioral1
Sample
2e7a988c2135655f43ba2622d9e3cec0cd082352be9a829dee43772a4db5a7a5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2e7a988c2135655f43ba2622d9e3cec0cd082352be9a829dee43772a4db5a7a5.exe
Resource
win10v2004-20220414-en
General
-
Target
2e7a988c2135655f43ba2622d9e3cec0cd082352be9a829dee43772a4db5a7a5
-
Size
113KB
-
MD5
f065237fd3b6c12dae373cf7815a92e8
-
SHA1
047579f3b675f1cd67e300dc065b129bf63b118f
-
SHA256
2e7a988c2135655f43ba2622d9e3cec0cd082352be9a829dee43772a4db5a7a5
-
SHA512
8462c2a3e8d7873103b7707219485f14d2b5d591f2c276eac90ff0fad91b9bb4cef82766a218e4404739a783e7da45c5fd08ae7450c43d054a4c44064c0a9275
-
SSDEEP
3072:ElAWZ3EnugzzOCRDzx/8Bd+UFm+V/TH4ljeQ6:ElAWZ0nuYzJ0BdQ6rH4ljM
Malware Config
Signatures
Files
-
2e7a988c2135655f43ba2622d9e3cec0cd082352be9a829dee43772a4db5a7a5.exe windows x86
e33c4c0a16de12109631d0b5d41dda2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
TlsAlloc
VirtualAlloc
DeleteFileW
LoadLibraryW
CreateEventW
SetSystemTime
GetCurrentDirectoryW
CreateMailslotW
LoadLibraryA
FindAtomW
GetCurrentProcessId
OpenFileMappingA
GetShortPathNameA
SetCurrentDirectoryA
WaitForSingleObjectEx
OpenEventW
ExitProcess
CreateFileA
GetTickCount
authz
AuthzFreeResourceManager
AuthzInitializeContextFromSid
AuthzAddSidsToContext
uxtheme
GetThemeFilename
GetThemeEnumValue
IsThemeActive
GetThemeBackgroundExtent
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 1024B - Virtual size: 870B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rlc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ