Static task
static1
Behavioral task
behavioral1
Sample
e7f652b2993b5b5f43d3edf82378103b9854b30bea8b86c7c1c13f34d29adb36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7f652b2993b5b5f43d3edf82378103b9854b30bea8b86c7c1c13f34d29adb36.exe
Resource
win10v2004-20220812-en
General
-
Target
e7f652b2993b5b5f43d3edf82378103b9854b30bea8b86c7c1c13f34d29adb36
-
Size
150KB
-
MD5
8171461f4eeee90a5556937621f83682
-
SHA1
735a6de360611f47739fb21ad76df48652e60195
-
SHA256
e7f652b2993b5b5f43d3edf82378103b9854b30bea8b86c7c1c13f34d29adb36
-
SHA512
2c3e6c43f490258b6816a537da55212534cc70a67cd8633847feb681e11a7546d3434a4d7efb820d7a02cb275fe6b7801242b369b5f27a329c6a3d2811043fb8
-
SSDEEP
3072:m/xVLLSk6uP+mTHiocC9gjnmEwihJpvFVMMV6BxvVXr4rkFFEHFUlmS:kU5zQSd39V/V4xvVLFElU
Malware Config
Signatures
Files
-
e7f652b2993b5b5f43d3edf82378103b9854b30bea8b86c7c1c13f34d29adb36.exe windows x86
add5b8dacb694c8c2cb92fe43b35d59a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
FlushFileBuffers
SetErrorMode
GetProcAddress
FindFirstFileW
GetFullPathNameW
GetSystemDefaultLCID
IsBadReadPtr
GetDiskFreeSpaceA
LocalFileTimeToFileTime
GetModuleHandleA
SetEndOfFile
LockFile
GetLastError
SetCurrentDirectoryW
ReadConsoleA
GetCommandLineA
CloseHandle
InitializeCriticalSection
SetStdHandle
RtlUnwind
GetCurrentDirectoryW
QueryPerformanceCounter
GetModuleFileNameA
WriteFile
CreateDirectoryA
SetEnvironmentVariableA
GetDriveTypeA
PeekConsoleInputA
LoadLibraryW
GetStdHandle
MultiByteToWideChar
Beep
WaitForSingleObject
GetModuleFileNameW
GetDriveTypeW
IsValidCodePage
DeleteFileA
SetCurrentDirectoryA
GetConsoleMode
IsBadCodePtr
FreeLibrary
EnterCriticalSection
ReadConsoleInputA
GetLocalTime
ResumeThread
CreateFileA
RemoveDirectoryW
GetExitCodeProcess
SetFileAttributesA
FileTimeToLocalFileTime
GetTimeZoneInformation
FindClose
RaiseException
ReadFile
SetConsoleMode
IsBadWritePtr
FindFirstFileA
GetACP
SetFileTime
SetLocalTime
GetStartupInfoA
FileTimeToSystemTime
GetLogicalDrives
CreateDirectoryW
GetCurrentThread
CreatePipe
SystemTimeToFileTime
GetFileAttributesA
WriteConsoleA
CreateFileW
UnlockFile
GetVersion
DeleteCriticalSection
TlsAlloc
SetEnvironmentVariableW
GetSystemDefaultLangID
SetFilePointer
GetFullPathNameA
GetNumberOfConsoleInputEvents
GetEnvironmentStrings
SetUnhandledExceptionFilter
GetCurrentProcess
SetFileAttributesW
FindNextFileA
DuplicateHandle
VirtualFree
SetConsoleCtrlHandler
GetCurrentDirectoryA
GetFileInformationByHandle
GetCPInfo
LeaveCriticalSection
RemoveDirectoryA
GetFileType
GetUserDefaultLCID
TlsGetValue
CreateThread
FindNextFileW
GetFileAttributesW
user32
MessageBoxA
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ