Static task
static1
Behavioral task
behavioral1
Sample
e035855ccf7c8b127a5791439d6635df29b8c87fb5b7ecdcdcf888708ea00348.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e035855ccf7c8b127a5791439d6635df29b8c87fb5b7ecdcdcf888708ea00348.exe
Resource
win10v2004-20220901-en
General
-
Target
e035855ccf7c8b127a5791439d6635df29b8c87fb5b7ecdcdcf888708ea00348
-
Size
752KB
-
MD5
0b147c0ae5b3ca03db2f3e1cec953897
-
SHA1
f66440d1759b11a42ca7b4481e40219b17503d4a
-
SHA256
e035855ccf7c8b127a5791439d6635df29b8c87fb5b7ecdcdcf888708ea00348
-
SHA512
5b2f36e752ed3ff5815a0250bbbe0f7db7b30f4655e93cb5b5196711df29bbfddb9195a0ee80494ced8c287c7317d16864ba7001385c63759ec4bf47c59626c3
-
SSDEEP
12288:eJXgCEEnlshVjql8vD4owT5wfnWNu1moMraoTjRN6VCdragblMR0V616RnOrSdrG:eJwtEn4ml/NT5tkUkwHYCdtlMR0V6sID
Malware Config
Signatures
Files
-
e035855ccf7c8b127a5791439d6635df29b8c87fb5b7ecdcdcf888708ea00348.exe windows x86
d214bb0c164b1e983da01a39be2c7f6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
GetCommandLineW
HeapDestroy
SuspendThread
GetStartupInfoA
FindResourceExA
OpenEventA
DeleteFileA
lstrlenW
GetVersion
ExitProcess
ReleaseMutex
CloseHandle
GetModuleHandleA
HeapCreate
CreateSemaphoreW
FindClose
WriteConsoleA
CloseHandle
GetEnvironmentVariableW
user32
SetFocus
GetClassInfoA
DispatchMessageA
GetKeyState
DispatchMessageA
GetWindowLongA
CreateIcon
GetSysColor
FindWindowA
CallWindowProcW
IsZoomed
DrawTextW
PeekMessageA
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ