Static task
static1
Behavioral task
behavioral1
Sample
e580369a113027ab8139afdf1f57f4c12e9928a98f5bf62778ac61c85bd25acd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e580369a113027ab8139afdf1f57f4c12e9928a98f5bf62778ac61c85bd25acd.exe
Resource
win10v2004-20220812-en
General
-
Target
e580369a113027ab8139afdf1f57f4c12e9928a98f5bf62778ac61c85bd25acd
-
Size
276KB
-
MD5
83601d9c6554896086c93fe5f5623a9a
-
SHA1
278a21d1de29b50d1304c81257ac84c230fecf02
-
SHA256
e580369a113027ab8139afdf1f57f4c12e9928a98f5bf62778ac61c85bd25acd
-
SHA512
ecb28cc47fcc2f76317e401398217d67f45b9979aaa724863c4bd6220ed6f3c253e746343d019e91903a5940eaa452436d6f46abf274994c91d7fbfde63a086e
-
SSDEEP
6144:lGuRSDRX/1X9XV0LEWdFXWR2qYZgzWEV/RIXh:lG31x9CLEQxq6Jh
Malware Config
Signatures
Files
-
e580369a113027ab8139afdf1f57f4c12e9928a98f5bf62778ac61c85bd25acd.exe windows x86
1c531c376875d89ed9b2cc113dd19b45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
IsValidLocale
SystemTimeToFileTime
GetSystemDefaultLangID
CloseHandle
GetCurrentProcessId
CreateFileA
lstrcpyW
GetTickCount
LoadLibraryA
GetCurrentProcess
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
WideCharToMultiByte
MultiByteToWideChar
GetProcessHeap
HeapAlloc
lstrcmpA
GetUserDefaultLCID
GetLocalTime
SetLastError
w32topl
ToplSTHeapInit
ToplScheduleCacheDestroy
ToplSTHeapDestroy
ToplScheduleExportReadonly
ToplScheduleCreate
ToplSTHeapExtractMin
ToplScheduleCacheCreate
fmifs
Extend
Chkdsk
FormatEx
DiskCopy
EnableVolumeCompression
Format
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ