Static task
static1
Behavioral task
behavioral1
Sample
e26054cf19c0f48b2cf837e35651d458018f807d2524a748251d7d8adb95158b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e26054cf19c0f48b2cf837e35651d458018f807d2524a748251d7d8adb95158b.exe
Resource
win10v2004-20221111-en
General
-
Target
e26054cf19c0f48b2cf837e35651d458018f807d2524a748251d7d8adb95158b
-
Size
80KB
-
MD5
513963700683e095fb8d89d47e1f0119
-
SHA1
16ab05b7f97fe8d3e52744ff8b9184f2974f42e1
-
SHA256
e26054cf19c0f48b2cf837e35651d458018f807d2524a748251d7d8adb95158b
-
SHA512
6afb24bcc97a2501af6475eb285f00f5373bfd04bd650efcb9d2c4709e51b263d0d21bc396eed917e88a058936dbf6256e3eeb8f6eaa4b6f33bd35b68b7c10c4
-
SSDEEP
1536:V095iM+KAYcaUQ0DvxDUNGSG8BRPBIzqcmKw+eW:VAoMmYcC0DvxDUNGSG8BRPBIzqcmAB
Malware Config
Signatures
Files
-
e26054cf19c0f48b2cf837e35651d458018f807d2524a748251d7d8adb95158b.exe windows x86
cc83ff10f134217482ea81b0551d5bbc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteTimerQueueEx
WriteConsoleOutputA
GetModuleFileNameA
ReadConsoleInputA
SetProcessPriorityBoost
VirtualAlloc
GetProcessHeap
IsBadStringPtrA
GetProcessWorkingSetSize
GetWindowsDirectoryA
SetFileApisToOEM
GetProfileStringA
VirtualAlloc
CreateNamedPipeA
OpenWaitableTimerA
GetThreadContext
DeviceIoControl
GetCurrentDirectoryA
IsValidCodePage
GetLastError
GetFileAttributesExA
WriteProfileSectionA
GetPriorityClass
SetCurrentDirectoryA
RtlMoveMemory
advapi32
CredUnmarshalCredentialA
CredMarshalCredentialW
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE