Static task
static1
Behavioral task
behavioral1
Sample
eae2530adfe7a4aad63f038459ff58d3fb6b204c2220d9972cad3be64b4da011.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eae2530adfe7a4aad63f038459ff58d3fb6b204c2220d9972cad3be64b4da011.exe
Resource
win10v2004-20220812-en
General
-
Target
eae2530adfe7a4aad63f038459ff58d3fb6b204c2220d9972cad3be64b4da011
-
Size
116KB
-
MD5
7edfcceb53382cb82276565fd31c3286
-
SHA1
533e3ad3173b965b7299b48b005ada3102f29643
-
SHA256
eae2530adfe7a4aad63f038459ff58d3fb6b204c2220d9972cad3be64b4da011
-
SHA512
5823b056812c421e2bf2ff026ffea62c27d748aaf3e7331eda1d7984ed6fbd18aedebab147ea79d1b5d7d7b0acd26c783d30e9dd96d05cfdc2cedf3f6cd3a58e
-
SSDEEP
1536:XU3etVq+QgYGiksMcmapIzYdhSknhVaORyiGqsdatRHlpnMaMMchvodm0v/:sebq+QnGmI8ddLlRPvAatRHjnMaMWUC
Malware Config
Signatures
Files
-
eae2530adfe7a4aad63f038459ff58d3fb6b204c2220d9972cad3be64b4da011.exe windows x86
48ba3c6dcd2715230cdfbb96e7de72ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFiber
GetCurrencyFormatA
EnumSystemCodePagesW
SetConsoleScreenBufferSize
CopyFileW
SetTermsrvAppInstallMode
SetThreadExecutionState
WritePrivateProfileStructW
GetShortPathNameW
EnumTimeFormatsA
TryEnterCriticalSection
SetThreadAffinityMask
DeleteTimerQueue
GetDevicePowerState
MapUserPhysicalPagesScatter
Process32NextW
MoveFileExW
GetCurrentThread
WriteProfileSectionA
SetConsoleKeyShortcuts
SetCommMask
FreeConsole
Process32NextW
GetFileAttributesA
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
.code Size: 4KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ