Static task
static1
Behavioral task
behavioral1
Sample
e402d59db1d284a448c18de10be0a57df2c9eed03edbc3beea00090faf8860d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e402d59db1d284a448c18de10be0a57df2c9eed03edbc3beea00090faf8860d9.exe
Resource
win10v2004-20220812-en
General
-
Target
e402d59db1d284a448c18de10be0a57df2c9eed03edbc3beea00090faf8860d9
-
Size
281KB
-
MD5
468c707dc465c9358a21c5fdf683e640
-
SHA1
673ac5fa7185d2731f922b7e53f7abb44ab7b938
-
SHA256
e402d59db1d284a448c18de10be0a57df2c9eed03edbc3beea00090faf8860d9
-
SHA512
85c8e315b6a8aa56a6e8c90996aa20749713104bbf69d11d77e410d90857e3318b275d3987c258b43818cf2731dfd2d30e1e13a679e97a26be35f68532817d43
-
SSDEEP
6144:yIwAwh3taXuIBjRXKbruDGJ6LGkN+OLRsodyQoOd9ulh+9mJhw:6h3tYuIBj5KSLGkN+iRs4/ch+8Jhw
Malware Config
Signatures
Files
-
e402d59db1d284a448c18de10be0a57df2c9eed03edbc3beea00090faf8860d9.exe windows x86
c57148691e293d987ea29d70e0ff6953
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
SystemTimeToFileTime
LoadLibraryA
QueryPerformanceCounter
SetUnhandledExceptionFilter
FindResourceW
lstrcmpA
GetUserDefaultLCID
WideCharToMultiByte
HeapFree
GetSystemTimeAsFileTime
GlobalFindAtomA
GetProcessHeap
lstrlenW
SetLastError
GetLocaleInfoW
CloseHandle
CreateFileA
MultiByteToWideChar
HeapAlloc
GetTickCount
lstrcpyW
GetCurrentProcessId
GetLocalTime
GetCurrentProcess
w32topl
ToplScheduleCacheDestroy
ToplSTHeapDestroy
ToplScheduleExportReadonly
ToplSTHeapExtractMin
ToplScheduleCacheCreate
ToplScheduleDuration
ToplSTHeapInit
ToplScheduleCreate
fmifs
ComputeFmMediaType
Format
DiskCopy
FormatEx
EnableVolumeCompression
Extend
Chkdsk
Sections
.text Size: 276KB - Virtual size: 307KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ