Static task
static1
Behavioral task
behavioral1
Sample
e73cee17eda131a75ec4daf804049673fba1d5ba9709565f504c9258a0fd1255.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e73cee17eda131a75ec4daf804049673fba1d5ba9709565f504c9258a0fd1255.exe
Resource
win10v2004-20220812-en
General
-
Target
e73cee17eda131a75ec4daf804049673fba1d5ba9709565f504c9258a0fd1255
-
Size
799KB
-
MD5
92cb39d35862f4189239682103688b60
-
SHA1
50c64c00e648373ad3984e16f698a5977a177222
-
SHA256
e73cee17eda131a75ec4daf804049673fba1d5ba9709565f504c9258a0fd1255
-
SHA512
5b3f1d08e43e1304b0b29136bbb43e2565cbbfcad1bf1189fd50d39667a1db54280161c4016219e6353e103bc980496a155ba33106d1652d9eb330f746800b85
-
SSDEEP
12288:QVqZpvxtwobrkRKzS/S8L48vBnNrF5mAvAYnv+Ti5E4NZ8B/ilXudMCSIyf:QsZftdbtYS8bvpJF5fveu2ixabS
Malware Config
Signatures
Files
-
e73cee17eda131a75ec4daf804049673fba1d5ba9709565f504c9258a0fd1255.exe windows x86
c897f90601f244849508749d85a4cf2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
HeapSize
GetModuleHandleA
lstrlenA
GetFileAttributesW
VirtualProtect
GlobalSize
SetEndOfFile
GetStdHandle
CreatePipe
GetLocaleInfoA
GetCommandLineA
SuspendThread
GetPriorityClass
DeleteFileA
ResumeThread
IsBadReadPtr
CreateDirectoryA
GetDriveTypeA
GetProcessHeap
WriteFile
ReadConsoleA
user32
GetWindowTextW
GetWindowLongA
DispatchMessageA
SetCursor
GetScrollInfo
DestroyMenu
GetWindowLongA
DrawIcon
SetRect
wsprintfA
PeekMessageA
LoadCursorA
DestroyIcon
els
DllGetClassObject
DllCanUnloadNow
DllUnregisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE