Static task
static1
Behavioral task
behavioral1
Sample
0e4e1d7ddb1eb2bf4bdc1df4ca90e1e226fc3d0470dbc0256cbbb8d7ea1f8e96.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e4e1d7ddb1eb2bf4bdc1df4ca90e1e226fc3d0470dbc0256cbbb8d7ea1f8e96.exe
Resource
win10v2004-20220812-en
General
-
Target
0e4e1d7ddb1eb2bf4bdc1df4ca90e1e226fc3d0470dbc0256cbbb8d7ea1f8e96
-
Size
147KB
-
MD5
e5ad3e7bcba32b43024e888feb44a2ac
-
SHA1
482171c3442e0302003dac6d5cbf4352599b9d51
-
SHA256
0e4e1d7ddb1eb2bf4bdc1df4ca90e1e226fc3d0470dbc0256cbbb8d7ea1f8e96
-
SHA512
efa4569a1200267049a9c2f67ad4a48e5710fca888124106f8ab210a275a7a1dbfc71f7700b7efd484b484b81fe4ba9b419ca721485bec461f351b3f92aefc8b
-
SSDEEP
1536:skV1U+qNYu7vBNclxxWGPuEJBzjc/vzYoil2DL76CT/pF6byxjFfMc9fqsWjcdHf:BPx8vXIpXWiIrpTjFfntHePbt
Malware Config
Signatures
Files
-
0e4e1d7ddb1eb2bf4bdc1df4ca90e1e226fc3d0470dbc0256cbbb8d7ea1f8e96.exe windows x86
ef8be9d015e1c8e69b86ade5251d8849
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
LoadResource
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
WaitForSingleObject
GetModuleHandleW
GetProcessHeap
WriteFile
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
HeapDestroy
LeaveCriticalSection
CreateFileW
MultiByteToWideChar
FindResourceExW
GetTempPathW
RaiseException
GetLastError
GetProcAddress
HeapSize
EnterCriticalSection
LockResource
DecodePointer
DeleteCriticalSection
CloseHandle
DeleteFileW
WriteConsoleW
SetStdHandle
LCMapStringW
lstrlenA
HeapReAlloc
lstrlenW
GetTempFileNameW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
LoadLibraryExW
GetStringTypeW
GetStartupInfoW
FlushFileBuffers
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
OutputDebugStringW
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
EncodePointer
ExitProcess
GetModuleHandleExW
GetCommandLineW
RtlUnwind
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
GetStdHandle
GetModuleFileNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
user32
MessageBoxW
LoadStringW
LoadIconW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteExW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
ws2_32
WSAEnumNetworkEvents
WSAEventSelect
WSACleanup
WSAGetOverlappedResult
WSAConnect
WSACreateEvent
WSASetLastError
closesocket
WSAResetEvent
WSAGetLastError
WSASend
WSASocketW
WSARecv
WSAStartup
WSASetEvent
WSACloseEvent
freeaddrinfo
getaddrinfo
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ