Static task
static1
Behavioral task
behavioral1
Sample
ec3fb675f9992c2b419a1b4e7dfe40e66e8ba568582d5373301788f574b318ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec3fb675f9992c2b419a1b4e7dfe40e66e8ba568582d5373301788f574b318ee.exe
Resource
win10v2004-20220901-en
General
-
Target
ec3fb675f9992c2b419a1b4e7dfe40e66e8ba568582d5373301788f574b318ee
-
Size
19KB
-
MD5
48920f40c69f6a29324cdea4eb119ef0
-
SHA1
2301db7c9395ca110dbdd938a893209f05863efc
-
SHA256
ec3fb675f9992c2b419a1b4e7dfe40e66e8ba568582d5373301788f574b318ee
-
SHA512
96d7127441aebd59419685e3664a5d04f0e250f001903bb3288346105f8f1411702a004c39edca8ce67f32424cbd2d2ddd610950d17db9e6fb72d9bbcf2d7bdc
-
SSDEEP
384:/3k3vm1KNR1KVzhewuhe9pbsmM/Kd/WK:/gNwee9hsE//
Malware Config
Signatures
Files
-
ec3fb675f9992c2b419a1b4e7dfe40e66e8ba568582d5373301788f574b318ee.exe windows x86
c49ddb17e1e934f7a3f2fd6f138b1805
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
OpenMutexA
GetLogicalDrives
GetStringTypeA
GetFileAttributesA
GetTickCount
GetStdHandle
CreateEventA
GetLogicalDrives
GetModuleHandleW
GetLogicalDriveStringsW
SetCurrentDirectoryW
GetLogicalDrives
VirtualProtectEx
lstrcpyW
GetModuleHandleA
riched20
RichEditANSIWndProc
RichEdit10ANSIWndProc
IID_IRichEditOle
IID_ITextHost
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.kdata Size: 9KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ