Static task
static1
Behavioral task
behavioral1
Sample
e0682b34160a140c0db0deecd992fce12b9cab88d8606e409fe76a0d13ccab4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0682b34160a140c0db0deecd992fce12b9cab88d8606e409fe76a0d13ccab4d.exe
Resource
win10v2004-20220812-en
General
-
Target
e0682b34160a140c0db0deecd992fce12b9cab88d8606e409fe76a0d13ccab4d
-
Size
61KB
-
MD5
0eb6e59adfbdecbe7c6f3fa88f64bff9
-
SHA1
3c7fc842d28874ce708442b0d9f0ed3a92e0c08a
-
SHA256
e0682b34160a140c0db0deecd992fce12b9cab88d8606e409fe76a0d13ccab4d
-
SHA512
3a6c8bd76ceae3a4796ab9d3d479da83454a2621b08a7134f9d452182291b7ebd7ff3d954250c9d8fbd7a846dfdcc5931ada499613dedfd0582d330f6c16a07f
-
SSDEEP
1536:TVFB2y6uVcH0TgkTAwKeqXIR/Sl8B3AtTVGUbmU3Bt7I:Ay6uq8HsbXIRaaUJGUyU3Bt7I
Malware Config
Signatures
Files
-
e0682b34160a140c0db0deecd992fce12b9cab88d8606e409fe76a0d13ccab4d.exe windows x86
79c89bebd67d41a3ba3a8e3436317721
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
SetEndOfFile
GetDriveTypeW
CloseHandle
WriteFile
RemoveDirectoryA
FindClose
WaitForMultipleObjects
GetCommandLineA
IsBadWritePtr
HeapFree
RemoveDirectoryA
ExitThread
DeleteAtom
CreateSemaphoreW
GetModuleFileNameA
GetModuleHandleA
AddAtomA
SetVolumeLabelA
CreateDirectoryA
GetFileType
HeapCreate
FindAtomA
CreatePipe
ClearCommBreak
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nbkrdfd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE