Static task
static1
Behavioral task
behavioral1
Sample
e736f90b66b6069b807a41c5f4ae2470f8459a66df0fc2c6110288ed16c83270.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e736f90b66b6069b807a41c5f4ae2470f8459a66df0fc2c6110288ed16c83270.exe
Resource
win10v2004-20220812-en
General
-
Target
e736f90b66b6069b807a41c5f4ae2470f8459a66df0fc2c6110288ed16c83270
-
Size
304KB
-
MD5
62e7799364432bceaa8904c495dba000
-
SHA1
21d94310155e701baa1b9957b0c785411c260cf6
-
SHA256
e736f90b66b6069b807a41c5f4ae2470f8459a66df0fc2c6110288ed16c83270
-
SHA512
fa258e6777081e8209caeb4c0c746b4e5dc940cd9543cf88120ce79b60706049d636890e261c4b747dea67e9bac4918e09acf1e78582264605422bf9bb22b0c2
-
SSDEEP
6144:+6WreL/DUV41XOgUmf90xh5VWaE+Kd5uC5/pxaP5QVG5dgmvYNF:CyL+41eg8Il+Kd5u6hxQiVGDWN
Malware Config
Signatures
Files
-
e736f90b66b6069b807a41c5f4ae2470f8459a66df0fc2c6110288ed16c83270.exe windows x86
1e26c06fa201a97361c8708a7156f1cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
FindCloseChangeNotification
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
TerminateProcess
GetCurrentProcess
MultiByteToWideChar
GetCPInfo
CompareStringA
CompareStringW
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ