Static task
static1
Behavioral task
behavioral1
Sample
e47e14bc3c6c0ff74a299d3cb2efd74cbb01fff04ff524dd75d9467c02dac3f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e47e14bc3c6c0ff74a299d3cb2efd74cbb01fff04ff524dd75d9467c02dac3f9.exe
Resource
win10v2004-20220812-en
General
-
Target
e47e14bc3c6c0ff74a299d3cb2efd74cbb01fff04ff524dd75d9467c02dac3f9
-
Size
251KB
-
MD5
641abcc9c8f927ebd9d3765a4e69e410
-
SHA1
80c9a5ff5f3de66640024f8c7ffb63a8cd45bf29
-
SHA256
e47e14bc3c6c0ff74a299d3cb2efd74cbb01fff04ff524dd75d9467c02dac3f9
-
SHA512
22fdcb1b1c80cbfa959eca4cbd49fda70b4c8a804eab514f7e7ba6ca77c1d79c67da8df16dada23d2d12219aff22e54515e5a9c344f10341de63587f2dbfa9a7
-
SSDEEP
768:lL3NfbgzOvXS0ROiH6I/qKaCew2eEh/RINnZ7M5XvqTKOktXE/E68L4akMwv3lCM:lL90zMfROi/8wPEjFKXktXIUL9svVHM
Malware Config
Signatures
Files
-
e47e14bc3c6c0ff74a299d3cb2efd74cbb01fff04ff524dd75d9467c02dac3f9.exe windows x86
dd0fe6089e404b4b7501b7b32736dfa1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
WaitForSingleObject
LoadLibraryA
HeapFree
EnterCriticalSection
GetTickCount
LocalFree
InterlockedIncrement
HeapAlloc
MultiByteToWideChar
GetStartupInfoA
GetCurrentThreadId
CreateFileW
GetModuleFileNameA
WriteFile
ReadFile
LocalAlloc
GetProcessHeap
MultiByteToWideChar
HeapAlloc
lstrcmpiW
LeaveCriticalSection
GetProcessHeap
QueryPerformanceCounter
GetCommandLineA
QueryPerformanceCounter
HeapAlloc
GetCurrentThreadId
WideCharToMultiByte
WideCharToMultiByte
WideCharToMultiByte
VirtualFree
GetSystemTimeAsFileTime
ExitProcess
SetEvent
GetCommandLineW
QueryPerformanceCounter
CloseHandle
GetProcAddress
SetUnhandledExceptionFilter
GetProcAddress
InitializeCriticalSection
WaitForSingleObject
GetStartupInfoA
DeleteCriticalSection
UnhandledExceptionFilter
Sections
.text Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.aata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE