Static task
static1
Behavioral task
behavioral1
Sample
e37240701155d2a86a052c53661cbd0dbd3bc91648951cffd555d05ddb60b685.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e37240701155d2a86a052c53661cbd0dbd3bc91648951cffd555d05ddb60b685.exe
Resource
win10v2004-20220812-en
General
-
Target
e37240701155d2a86a052c53661cbd0dbd3bc91648951cffd555d05ddb60b685
-
Size
123KB
-
MD5
845f1aa802dc3d1c5336100db49aaa60
-
SHA1
b6508c620f1e285a75d33c7f3c65cc9d198f142c
-
SHA256
e37240701155d2a86a052c53661cbd0dbd3bc91648951cffd555d05ddb60b685
-
SHA512
73a6d435deb7728ceea9375e6a0480fa498ab8ff9f5bcfc1f08906423fa41227100bc08fcc0a1a5fb672f3ce8d37204328202066cb35080b1687b750bb397e42
-
SSDEEP
1536:bttDcJ/8GW8elTcGy9rNtgJQi+yXCOIVSUGcRmNr/8QuAg7coox8TkfvLj8qRh:oDuTcGyRNAPgOiGQmeQoIZgkXLog
Malware Config
Signatures
Files
-
e37240701155d2a86a052c53661cbd0dbd3bc91648951cffd555d05ddb60b685.exe windows x86
6fb455dfa87cc42ab179c042f2af4b2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteFileA
VirtualProtect
GetPriorityClass
GetModuleHandleA
GlobalSize
GetFileAttributesA
GetCommandLineA
GetLocaleInfoA
CreatePipe
SetLocalTime
IsBadReadPtr
ResumeThread
SuspendThread
ReadConsoleW
WriteFile
GetStdHandle
HeapSize
CreateDirectoryA
ResumeThread
GetDriveTypeA
GetProcessHeap
user32
GetWindowLongA
GetWindowLongA
DispatchMessageA
DrawIcon
PeekMessageA
SetFocus
GetWindowTextW
GetMessageA
SetRect
LoadCursorA
DestroyMenu
wsprintfA
SetCursor
els
DllRegisterServer
DllRegisterServer
DllGetClassObject
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE