Static task
static1
Behavioral task
behavioral1
Sample
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe
Resource
win10v2004-20220812-en
General
-
Target
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f
-
Size
853KB
-
MD5
dde0c436cdeb3bb7c96f59c02eadf676
-
SHA1
86f121c0da59ca908e61e292da069801da0b5713
-
SHA256
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f
-
SHA512
17336235bbadfa9786446049bf5f2c4b874d6d1dd57cc7b1d2616b8f2307345f174095d5d80f8e4fd3b007a47dac10f87c24ab4d671130e91e624bb857215e73
-
SSDEEP
12288:N5yfy1FHvnnzVg4ARZNN7iEcRHgsB8OfEWFB76NTmHf0ALSEWt:u6nn5jARZNsEAAwl3j2BmZpWt
Malware Config
Signatures
Files
-
ea93bcf7e741a7a692f142194b9a39455c3e98c3c22a9ed11e421cad9192e46f.exe windows x86
76c0cffd5a0b49d5962f62f13aee43e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetCommandLineA
GetFileAttributesA
GetPriorityClass
GetStdHandle
GetEnvironmentVariableA
CreateMailslotW
DeleteFileA
GetStartupInfoA
IsBadCodePtr
FindAtomA
DeleteAtom
ReadFile
GetModuleHandleA
HeapDestroy
CloseHandle
GetCurrentProcessId
SuspendThread
GetProcessTimes
GetModuleFileNameA
user32
CallWindowProcW
SetFocus
DispatchMessageA
IsZoomed
DispatchMessageA
GetWindowInfo
DestroyMenu
GetClassInfoA
GetClientRect
DrawTextW
GetKeyState
GetSysColor
GetWindowLongA
DestroyMenu
msctfp
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 843KB - Virtual size: 842KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ