Static task
static1
Behavioral task
behavioral1
Sample
e03e2e81ed48b22acb4783b33d77d74c949a498f7d6619085b7e1ba9fde4e23d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e03e2e81ed48b22acb4783b33d77d74c949a498f7d6619085b7e1ba9fde4e23d.exe
Resource
win10v2004-20220812-en
General
-
Target
e03e2e81ed48b22acb4783b33d77d74c949a498f7d6619085b7e1ba9fde4e23d
-
Size
269KB
-
MD5
0a3d619cf5e396cd5de1cf2d42184039
-
SHA1
3ba528201e13ffb335deb47dd01aec9e3d58e979
-
SHA256
e03e2e81ed48b22acb4783b33d77d74c949a498f7d6619085b7e1ba9fde4e23d
-
SHA512
23134d27bf4e6dda11082e45663d5904e68fb57d131e4c493fc1a40eefcfb0dbf14e22f1ff396fe9ea5f561f6b55a1d6af5dcb828c549e46f86df56484859761
-
SSDEEP
6144:Ysof6csz97e5TeJUA2TBr1/3WEt0ClAxIqg1:Ys1jx65TC2T/WTYJqM
Malware Config
Signatures
Files
-
e03e2e81ed48b22acb4783b33d77d74c949a498f7d6619085b7e1ba9fde4e23d.exe windows x86
b78a94bd64157c24a05bedf37e99b49d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcesses
kernel32
GetVersionExA
FindNextFileW
MultiByteToWideChar
CreateFileW
GetTickCount
FindClose
FindResourceExW
FindResourceW
SizeofResource
CloseHandle
LockResource
FindFirstFileW
WideCharToMultiByte
ReadFile
LoadResource
DeleteFileW
GetSystemDirectoryA
lstrlenA
LeaveCriticalSection
LoadLibraryA
GetProcessHeap
FreeLibrary
WaitForSingleObject
GetProcAddress
InitializeCriticalSection
HeapReAlloc
HeapFree
EnterCriticalSection
HeapAlloc
DeleteCriticalSection
GetFileSize
lstrlenW
GetLastError
SetEndOfFile
GetConsoleMode
GetConsoleCP
CreateFileA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
VirtualFree
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
WriteFile
RaiseException
HeapDestroy
HeapSize
MoveFileW
VirtualProtect
VirtualAlloc
GetModuleHandleA
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetStdHandle
GetFileType
SetFilePointer
SetHandleCount
GetStdHandle
Sleep
ExitProcess
RtlUnwind
HeapCreate
shell32
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
ws2_32
WSAConnect
inet_addr
WSAEnumNetworkEvents
getservbyport
htonl
htons
WSAGetOverlappedResult
getservbyname
closesocket
WSAStartup
WSASetEvent
WSACreateEvent
gethostbyaddr
WSAGetLastError
WSASocketW
WSAResetEvent
WSARecv
WSAEventSelect
inet_ntoa
WSACloseEvent
gethostbyname
WSACleanup
WSASetLastError
ntohs
WSASend
user32
UnregisterClassA
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE