Static task
static1
Behavioral task
behavioral1
Sample
01eb0b2c7e9bbe97a930035866692521f564315c5e1dd6522412da743ede4ac1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01eb0b2c7e9bbe97a930035866692521f564315c5e1dd6522412da743ede4ac1.exe
Resource
win10v2004-20220812-en
General
-
Target
01eb0b2c7e9bbe97a930035866692521f564315c5e1dd6522412da743ede4ac1
-
Size
85KB
-
MD5
6148db2db5d7f76a3d0a5a8367dd9060
-
SHA1
3eb1eb0faabc5598484523d8cecc3c76256679b8
-
SHA256
01eb0b2c7e9bbe97a930035866692521f564315c5e1dd6522412da743ede4ac1
-
SHA512
972c0d869c07fc99c502995f12d61c8ddd3094068ce508a2e68a1c3a5e28ae837fafcfb462558f6d760cad820e0e109a9c5c692bbac8a05aca3a625dc571c7a8
-
SSDEEP
1536:AidBVzeu5sgbnHfIG1hVF2khxzQOy5I45vKySv12R9I61vzHp:BdBVz5sgbn/jmqxtKvKby7z
Malware Config
Signatures
Files
-
01eb0b2c7e9bbe97a930035866692521f564315c5e1dd6522412da743ede4ac1.exe windows x86
fe36ff6a31b66dc9f5c2e121483dc275
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SuspendThread
GetPriorityClass
ReadConsoleW
GetLocaleInfoA
GetCommandLineA
SetLocalTime
GetStdHandle
GetFileAttributesA
GlobalSize
CreateDirectoryA
CreatePipe
GetDriveTypeA
ResumeThread
WriteFile
GetModuleHandleA
DeleteFileA
HeapSize
IsBadReadPtr
ResumeThread
VirtualProtect
user32
SetRect
GetWindowTextW
DrawIcon
DestroyIcon
GetWindowLongA
GetWindowLongA
DispatchMessageA
SetCursor
LoadCursorA
GetMessageA
wsprintfA
PeekMessageA
DestroyMenu
els
DllUnregisterServer
DllRegisterServer
DllGetClassObject
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE