Static task
static1
Behavioral task
behavioral1
Sample
ea773d8e144db4cef0af1120fe507e3843866cce6aeb4959e0d58e9ed005abdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea773d8e144db4cef0af1120fe507e3843866cce6aeb4959e0d58e9ed005abdd.exe
Resource
win10v2004-20220812-en
General
-
Target
ea773d8e144db4cef0af1120fe507e3843866cce6aeb4959e0d58e9ed005abdd
-
Size
154KB
-
MD5
0fedfb0541de49705abe6f6c968c6540
-
SHA1
386ed55892961da71152acde17ab5f7d170268bb
-
SHA256
ea773d8e144db4cef0af1120fe507e3843866cce6aeb4959e0d58e9ed005abdd
-
SHA512
0703562b359de0a26e3d704f1852a9b0ae56fda1ef7df09e9f7764ac2c3f8446c99e5b1f8573455b7e00a60a5763e04c711b44954680f79d04b05a960cc59047
-
SSDEEP
3072:5yGceg1d1bs3kAvcmiOdtoIFVdj+n9Tyece5GKMB3CuOLGSeg3GF:GbjA3iO5FLWhrceYPFOLGSeVF
Malware Config
Signatures
Files
-
ea773d8e144db4cef0af1120fe507e3843866cce6aeb4959e0d58e9ed005abdd.exe windows x86
fc8c04fb3a224ce6ba81ad0790acaeed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memmove
strcmp
strlen
kernel32
GetModuleHandleA
HeapCreate
CreateFileA
GetFileSize
SetFilePointer
LocalAlloc
ReadFile
LocalFree
CreateProcessA
HeapDestroy
ExitProcess
MultiByteToWideChar
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
HeapReAlloc
HeapAlloc
ntdll
NtUnmapViewOfSection
ole32
CoCreateInstance
winmm
mixerGetNumDevs
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.k17l Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ