Static task
static1
Behavioral task
behavioral1
Sample
e4b83952775c780ce44243388f38a2ad185f39611fb086af795954be7a95b888.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4b83952775c780ce44243388f38a2ad185f39611fb086af795954be7a95b888.exe
Resource
win10v2004-20220812-en
General
-
Target
e4b83952775c780ce44243388f38a2ad185f39611fb086af795954be7a95b888
-
Size
35KB
-
MD5
0624721a4e2fa0f2b19c551849a68340
-
SHA1
122a14ff0c6a0ba4fdc6bf0c6b504db25427aa9b
-
SHA256
e4b83952775c780ce44243388f38a2ad185f39611fb086af795954be7a95b888
-
SHA512
6d9cef6694cb696070e42102fc2f0b45a20517f19ff025135da141cc1f250e4f3a9f5354e302e3d8a541b444c3692922d5973ffeabad84b9505b3af5a2c4afcf
-
SSDEEP
768:IBK+Sj3extdai79k5ah1PrbIXAd70i9tWojhi4Sq4D:ebSbendai79Mi1jbIX+YstLjh1T
Malware Config
Signatures
Files
-
e4b83952775c780ce44243388f38a2ad185f39611fb086af795954be7a95b888.exe windows x86
c6252fccf829b9d03821f28adaf32c75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_except_handler3
_initterm
__getmainargs
__initenv
exit
_write
_cexit
_XcptFilter
__setusermatherr
_exit
_c_exit
advapi32
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
GetUserNameA
RegCloseKey
kernel32
GetTickCount
FormatMessageA
LocalFree
GetComputerNameA
GetFileSize
_lclose
GetModuleHandleA
OpenFile
_lread
lprhelp
WriteJobData
StartJob
InitiateConnection
CloseLPR
CancelJob
OpenLPR
EndJob
user32
CharToOemBuffA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ycekibo Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE