Static task
static1
Behavioral task
behavioral1
Sample
e32a6accf169e03da4502e1f209891462bff1f776ac51a2d3460976c1aeef6c1.exe
Behavioral task
behavioral2
Sample
e32a6accf169e03da4502e1f209891462bff1f776ac51a2d3460976c1aeef6c1.exe
Resource
win10v2004-20220812-en
General
-
Target
e32a6accf169e03da4502e1f209891462bff1f776ac51a2d3460976c1aeef6c1
-
Size
93KB
-
MD5
6a6eabcc85d0c2c8f7e083f4bf2020e5
-
SHA1
c48ce89505f095cfb305b911084e4487533ac572
-
SHA256
e32a6accf169e03da4502e1f209891462bff1f776ac51a2d3460976c1aeef6c1
-
SHA512
fe2adb55798b2762a58abc03e193bcce089b8fa7f544f05422ffb53ea59f57982e3c3674e463e799869b4c6163fadb06a2c8c6114bad4262db049001041fd966
-
SSDEEP
1536:dDGKAmreAhUOvLq4h0X9BFJ7rCf3Dxohb84FAYl28d2PdoqM1gbZE5Y:dC4N6eLeP7rCf36YdYsrdGYmu
Malware Config
Signatures
Files
-
e32a6accf169e03da4502e1f209891462bff1f776ac51a2d3460976c1aeef6c1.exe windows x86
2242d9413477e71d3a7ebc77186bc1db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
memset
memcpy
free
rand
comctl32
ord17
kernel32
GetProcessId
VirtualQuery
GetModuleHandleA
SetEvent
CreateEventA
CloseHandle
WaitForSingleObject
CreateMutexA
ExitProcess
user32
LoadStringA
LoadAcceleratorsA
GetWindowRect
SetTimer
SetScrollRange
GetScrollRange
InvalidateRect
MoveWindow
SetWindowPos
SendMessageA
PostMessageA
CreateWindowExA
DestroyWindow
FindWindowA
ModifyMenuA
MessageBoxA
DestroyMenu
CreateMenu
SetScrollPos
SetScrollInfo
TranslateMessage
TranslateAcceleratorA
GetMessageA
SetWindowTextA
ShowWindow
gdi32
CombineRgn
CreateRectRgn
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ