Static task
static1
Behavioral task
behavioral1
Sample
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe
Resource
win10v2004-20220901-en
General
-
Target
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059
-
Size
86KB
-
MD5
91fbb1c9e66aed72ae81439360b99770
-
SHA1
945712a00da4d304e345b7353c0d6a4cd04293d0
-
SHA256
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059
-
SHA512
889b65fda1fa02a1c84849b0cbf265ffaab787f9e51a78f4c5cbc907242fea0115298e8a0440913589d6c126559e440582ea09c37000f9ea2a44d54032585b41
-
SSDEEP
1536:iMP5xvb/GUPMWLpbQ/UTO7TkiU9OAA5JL3sF1:VvbeUrcclXM3DTsD
Malware Config
Signatures
Files
-
e6fe123e3594d7d45b980404d50c0fad2229ef68eeaeba3b0f9fb805d87a3059.exe windows x86
c0132a05b49063a6810b93ff7112c800
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GlobalFlags
HeapCreate
FindClose
GetCurrentThreadId
GetDriveTypeA
InitializeCriticalSection
GetPrivateProfileStringA
GetFileTime
lstrlenW
CreateEventW
ReleaseMutex
GetEnvironmentVariableW
FindAtomA
GetCurrentProcessId
LoadLibraryW
LocalFree
IsBadStringPtrW
TlsGetValue
ReleaseMutex
user32
CallWindowProcW
DrawTextA
GetSysColor
DispatchMessageA
CreateWindowExA
IsWindow
SetFocus
GetClassInfoA
DrawStateW
GetKeyboardType
GetClientRect
GetSysColor
EndDialog
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE