Static task
static1
Behavioral task
behavioral1
Sample
0e2f4f89cd6366d128952707a9713fd067dee050cfc0e6bfa47f52d89f092ccb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e2f4f89cd6366d128952707a9713fd067dee050cfc0e6bfa47f52d89f092ccb.exe
Resource
win10v2004-20220901-en
General
-
Target
0e2f4f89cd6366d128952707a9713fd067dee050cfc0e6bfa47f52d89f092ccb
-
Size
320KB
-
MD5
a031a35145d6cf21390c90eb83cd5680
-
SHA1
ddc6823c93983b8a2920f3a3299ef848f54a17f6
-
SHA256
0e2f4f89cd6366d128952707a9713fd067dee050cfc0e6bfa47f52d89f092ccb
-
SHA512
d371a116276c5470169b10195db702633d118af9696d7930c9c2ff053c71d6280c3c07a7e33f71c72139c3bcf83be53a38a2a34906a658c5b73c46715ef5a235
-
SSDEEP
6144:owpTcajCuMQnWd5XH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:oDajCinWD2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
0e2f4f89cd6366d128952707a9713fd067dee050cfc0e6bfa47f52d89f092ccb.exe windows x86
8801d43664a64efa36e3e321e7399b1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugBreakProcess
FindActCtxSectionStringA
VerSetConditionMask
HeapUsage
GetCurrentThreadId
GetProcessAffinityMask
FindActCtxSectionGuid
GetSystemDefaultUILanguage
WritePrivateProfileStringA
LZRead
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE