Static task
static1
Behavioral task
behavioral1
Sample
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe
Resource
win10v2004-20221111-en
General
-
Target
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd
-
Size
300KB
-
MD5
cd54cb1f4864bce38f8d0119c24b2222
-
SHA1
e67b482d112804fc244d2ec34b235c577d9d7d79
-
SHA256
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd
-
SHA512
73409373004ed8b0c6db1e519b3e2b34883f80bc628121db56e96a4a504d5f4336406e7d3bee53c6a4c7380fe27f390c23884254448cb376479ae81c9ec2b0e9
-
SSDEEP
6144:D6XgdcbBWNIgx+l4Am5Q7kHdZisdYS8Byw9zqzeHruHXaRr7Z+uZA4MAyWX:+QdcbBRgIlM50kHdZiIzw9zoeHruHXaW
Malware Config
Signatures
Files
-
e3aef0f0fa53bcd17829119dd122372d50ffdd47a7982aadc6f0260418c767bd.exe windows x86
f689de0e9b75c6d5f6e989e84f4abfe2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
GetLogicalDriveStringsW
lstrcmpiW
GetStdHandle
GetCommState
DeleteFileA
GetProcessHeap
lstrcmpiW
GetConsoleAliasW
HeapCreate
CreateNamedPipeW
SetLastError
GetStartupInfoA
lstrlenA
IsValidLocale
lstrcmpiW
GetModuleHandleA
lstrcmpiW
FileTimeToLocalFileTime
GetModuleFileNameA
GetVolumePathNameW
Sleep
CreateMailslotW
sqlunirl
_CallMsgFilter_@8
wsprintf_
_AppendMenu_@16
AbortSystemShutdown_
Sections
.text Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.RDATA Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORPC Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ