Static task
static1
Behavioral task
behavioral1
Sample
e696044453dd8afea31430e1d6393b68268ddd89e04b08ac47b51d4627a47c3c.exe
Resource
win7-20220812-en
General
-
Target
e696044453dd8afea31430e1d6393b68268ddd89e04b08ac47b51d4627a47c3c
-
Size
287KB
-
MD5
a0c094dcf7555853ed52ea9a41414788
-
SHA1
54a1903185eefefd4688f709df0a84662f53f3ed
-
SHA256
e696044453dd8afea31430e1d6393b68268ddd89e04b08ac47b51d4627a47c3c
-
SHA512
c1e69fa3d1ca7be1670f90281f86c6694fc3bf873df9b45a79aedde88b301e70a6076be098858f4166c60ec8ef5e2b81e8472959d0ad7774643ca75ddd7cb8e3
-
SSDEEP
6144:YRQ2HIELgNzWXH3JBf4Q+q9B1gLBsnBdXHD5:R4IELghW3X/79DWed
Malware Config
Signatures
Files
-
e696044453dd8afea31430e1d6393b68268ddd89e04b08ac47b51d4627a47c3c.exe windows x86
932de0b285416bd198deafa214fffbcb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shell32
ShellExecuteA
Shell_NotifyIconA
kernel32
LocalAlloc
MultiByteToWideChar
GlobalFindAtomA
CreateDirectoryW
OutputDebugStringA
SearchPathW
LocalFree
OutputDebugStringW
ExitProcess
GetCurrentProcess
DuplicateHandle
GetFileAttributesW
EnumResourceLanguagesW
GetFileInformationByHandle
lstrcmpiW
VirtualQuery
lstrlenW
GetModuleFileNameW
GetPrivateProfileStructA
GetModuleHandleA
GetCurrentThreadId
VirtualProtect
SetLastError
GetCurrentDirectoryW
SetEnvironmentVariableW
WideCharToMultiByte
InterlockedExchange
oleacc
CreateStdAccessibleObject
shlwapi
StrRetToBSTR
PathAppendA
PathIsFileSpecA
PathIsContentTypeA
SHCreateStreamOnFileEx
PathCreateFromUrlW
Sections
.text Size: 148KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ