Static task
static1
Behavioral task
behavioral1
Sample
e2506569b3bea5894e745301e8b9024f0707e2fb1438868994bd39830652f2c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2506569b3bea5894e745301e8b9024f0707e2fb1438868994bd39830652f2c8.exe
Resource
win10v2004-20220812-en
General
-
Target
e2506569b3bea5894e745301e8b9024f0707e2fb1438868994bd39830652f2c8
-
Size
85KB
-
MD5
905bfce0c8a79f4b96b3355873934120
-
SHA1
a0e8e7e861773191f3e12188640748ce51c7ffcd
-
SHA256
e2506569b3bea5894e745301e8b9024f0707e2fb1438868994bd39830652f2c8
-
SHA512
479d8d9c4b7181a4b1bebaf4f30b3b2927d3fa79724ce5272b42e51b78810e13a8bfbc06e24bc76230748de13449b8fc8816920e0dc3f4b1147303f214bb9800
-
SSDEEP
1536:vkT0/65hiCSs8ElvsMiOouUL5G29kE2oxKMHW:8T0GzSs8Elv1iO0v9noM
Malware Config
Signatures
Files
-
e2506569b3bea5894e745301e8b9024f0707e2fb1438868994bd39830652f2c8.exe windows x86
15c431795bce2067d35339f95f53822c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCommandLineA
IsBadReadPtr
GetModuleHandleA
HeapSize
CreatePipe
DeleteFileA
GetStdHandle
CreateDirectoryA
GetFileAttributesA
ReadConsoleW
GlobalSize
GetProcessHeap
ResumeThread
GetPriorityClass
GetDriveTypeA
SuspendThread
SetLocalTime
GetLocaleInfoA
WriteFile
ResumeThread
VirtualProtect
user32
GetWindowLongA
SetRect
DestroyMenu
PeekMessageA
SetCursor
DestroyIcon
GetWindowLongA
wsprintfA
GetWindowTextW
LoadCursorA
GetMessageA
DrawIcon
DispatchMessageA
els
DllUnregisterServer
DllRegisterServer
DllGetClassObject
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE