Static task
static1
Behavioral task
behavioral1
Sample
ee57ec9ddccf392a3a4efe31dd1fad05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee57ec9ddccf392a3a4efe31dd1fad05.exe
Resource
win10v2004-20220901-en
General
-
Target
ee57ec9ddccf392a3a4efe31dd1fad05
-
Size
1.7MB
-
MD5
ee57ec9ddccf392a3a4efe31dd1fad05
-
SHA1
0a03d259a7bbab4b97e1066980de361587085bd4
-
SHA256
e533e32fb71c8f23c2bd2925c659ef494f1a01c19e8ca38473c90b5ff1263c7e
-
SHA512
c0da5b2f05e5611b7cfcd35ea68ecb7ed3277e6c625693f1f425decfbedb17cadbd07be3df6f7666365b5ea7e9637dae8cae1f69e7ed7bd6fe1d9b0ac4c9e0b7
-
SSDEEP
24576:rjhXeF6y8u1FtnN1YNBOFlzA3P16/OMX5DHvU/12Pi21Om:nnyN1rnvOoKw/OYBP99
Malware Config
Signatures
Files
-
ee57ec9ddccf392a3a4efe31dd1fad05.exe windows x86
b144870e3a37e200b228432e9ff61d95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
HeapDestroy
HeapFree
HeapCreate
HeapAlloc
GetProcessHeap
CloseHandle
QueryPerformanceCounter
ReadFile
SetFilePointer
CreateFileA
ExitProcess
GetModuleFileNameA
Sleep
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualFree
IsBadReadPtr
lstrcmpiA
FreeLibrary
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE