Static task
static1
Behavioral task
behavioral1
Sample
e2b4302a2f2cfb4b25cde4aa6c7df8352d14f843836ffc876b987084ebd79e32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2b4302a2f2cfb4b25cde4aa6c7df8352d14f843836ffc876b987084ebd79e32.exe
Resource
win10v2004-20220812-en
General
-
Target
e2b4302a2f2cfb4b25cde4aa6c7df8352d14f843836ffc876b987084ebd79e32
-
Size
24KB
-
MD5
663660ffb981421f71ba5b6772cdf190
-
SHA1
f6583135dc771c65939a21ed0b06b6a1b0083c46
-
SHA256
e2b4302a2f2cfb4b25cde4aa6c7df8352d14f843836ffc876b987084ebd79e32
-
SHA512
663ed293e3eb3018da0f82b99d7178b80123ead4a0130e9f89e59d0fdfca3a69702becbb31895c4f9b3aa6c3b5431fc831fa3c398e3d9fb4c607902ec9a72b0e
-
SSDEEP
384:1T4eSvnzJ8MEK3bilxUr5QJ8QqEL2e1Tv:1TZSvnN8MEK3Gler5M8Zhed
Malware Config
Signatures
Files
-
e2b4302a2f2cfb4b25cde4aa6c7df8352d14f843836ffc876b987084ebd79e32.exe windows x86
2f330339b5273176d29595802f8469e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
OpenEventA
SetEvent
Sleep
lstrcatA
DeleteFileA
lstrcpyA
GetCurrentProcess
GetModuleHandleW
GetProcAddress
CloseHandle
WinExec
HeapReAlloc
VirtualAlloc
ExitProcess
GetModuleHandleA
GetCommandLineA
WriteFile
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
CreateFileA
GetFileAttributesA
GetTempPathA
CompareStringA
Process32First
CreateToolhelp32Snapshot
TerminateProcess
RtlUnwind
InterlockedExchange
VirtualQuery
user32
MessageBoxA
CharToOemA
ExitWindowsEx
wsprintfA
BeginPaint
ReleaseDC
ShowWindow
AnyPopup
advapi32
RegDeleteValueA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE