Static task
static1
Behavioral task
behavioral1
Sample
e4f782862c91594fd292e68bf806081ca329ddf6ff568bf5c7884ae51c217233.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4f782862c91594fd292e68bf806081ca329ddf6ff568bf5c7884ae51c217233.exe
Resource
win10v2004-20220812-en
General
-
Target
e4f782862c91594fd292e68bf806081ca329ddf6ff568bf5c7884ae51c217233
-
Size
180KB
-
MD5
1e5889aec076190f9988baddfa5ed7e9
-
SHA1
2494eb3abcfec6f8e06b7b0bd36255159218cfce
-
SHA256
e4f782862c91594fd292e68bf806081ca329ddf6ff568bf5c7884ae51c217233
-
SHA512
c669d9f9696abcb577a17926b47ef6f74da85881e49035cae1ee617c8cb56339c2af13deede1fa7499973255b6be191010c506503351142594195712f78be791
-
SSDEEP
3072:LgXhbrAW6K1ZQd3QhM5Zw8o8JO7GEd15viBbLTVLmF3HP8MTwVHly7NHK:OxrqKPQdwEw8o8J/ObvobtLmF3HPbQlN
Malware Config
Signatures
Files
-
e4f782862c91594fd292e68bf806081ca329ddf6ff568bf5c7884ae51c217233.exe windows x86
240bdc2a82755040fc16ef59ed417bea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualProtectEx
GlobalUnlock
EnumResourceTypesW
GetConsoleTitleA
lstrlenA
GetModuleHandleA
IsBadReadPtr
IsDebuggerPresent
GlobalLock
LoadLibraryExW
GetSystemTime
CreateEventA
GetStdHandle
CloseHandle
FindClose
FreeConsole
CreateMutexA
LocalFree
CancelIo
user32
IsIconic
GetSubMenu
IsMenu
GetKeyState
LoadCursorA
DialogBoxParamA
CreateWindowExA
GetMessageA
GetMessageA
EnumWindows
GetDlgItemTextA
EndDialog
GetParent
MessageBoxA
clbcatq
SetSetupOpen
ComPlusMigrate
GetComputerObject
GetCatalogObject
CheckMemoryGates
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ