Static task
static1
Behavioral task
behavioral1
Sample
e1ad13fc4e0c5a345dbdc11c75024f2d7ef3090cd9acf96ecc9af916c7ef2407.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1ad13fc4e0c5a345dbdc11c75024f2d7ef3090cd9acf96ecc9af916c7ef2407.exe
Resource
win10v2004-20220812-en
General
-
Target
e1ad13fc4e0c5a345dbdc11c75024f2d7ef3090cd9acf96ecc9af916c7ef2407
-
Size
76KB
-
MD5
2c1f6cfefe92fb64d749162b9574fbb0
-
SHA1
97e49df91bf7cfb179fb26064d19121b8d875bfc
-
SHA256
e1ad13fc4e0c5a345dbdc11c75024f2d7ef3090cd9acf96ecc9af916c7ef2407
-
SHA512
5a8cb4b930f664c20568e7a011d3a8a116b1381692774f31fe9ea8181288f3a33b675d8d4954c3a8362e624015496357ca4e01f3e5f96659f407cb7e6c07de2f
-
SSDEEP
768:MoZHDWetU25dSc/Bp1dvqBbgha5dB1DYKF+0t1:M8jWf4H5BviMha51sUt1
Malware Config
Signatures
Files
-
e1ad13fc4e0c5a345dbdc11c75024f2d7ef3090cd9acf96ecc9af916c7ef2407.exe windows x86
d8dbcd6f7909bad960888718abad4aad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcessId
LoadLibraryW
ExitProcess
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
SetFilePointer
MultiByteToWideChar
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FlushFileBuffers
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE