Static task
static1
Behavioral task
behavioral1
Sample
e59b3272f4ebff1b3013c6dbbf04ed72f30ed84974b55e0f83307d5ecccaee41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e59b3272f4ebff1b3013c6dbbf04ed72f30ed84974b55e0f83307d5ecccaee41.exe
Resource
win10v2004-20220812-en
General
-
Target
e59b3272f4ebff1b3013c6dbbf04ed72f30ed84974b55e0f83307d5ecccaee41
-
Size
116KB
-
MD5
12a5efbe8629c8d7204ebbeb6ac9a4e0
-
SHA1
661c0169b2295b12de017b8003bb238c67b1af7c
-
SHA256
e59b3272f4ebff1b3013c6dbbf04ed72f30ed84974b55e0f83307d5ecccaee41
-
SHA512
eed9c7c29c34b9bfef358b500cdc8fabbb40a1b334abc9bcf9bc6a0c5281c72935a1d239be8af9ecfcc9960fe71114078b8f85776cd0d6b413d0d06722183345
-
SSDEEP
1536:VnoAZ+hhuKL8lkQRrkcm464OBbYL53GJr95WAxJnolVzkRGcm2/:VoAohYkQr0jeLwJr95rJo3kI2/
Malware Config
Signatures
Files
-
e59b3272f4ebff1b3013c6dbbf04ed72f30ed84974b55e0f83307d5ecccaee41.exe windows x86
755a414ec2e464fc157ccbf84f6a977b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_except_handler4_common
__set_app_type
_controlfp
?terminate@@YAXXZ
__wgetmainargs
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
ole32
CoUninitialize
CoInitializeEx
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE