Static task
static1
Behavioral task
behavioral1
Sample
e5e00af044d3c819a20d9e759bcbfe3696d0b709cfc6e22f29f21ae6823591f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5e00af044d3c819a20d9e759bcbfe3696d0b709cfc6e22f29f21ae6823591f1.exe
Resource
win10v2004-20221111-en
General
-
Target
e5e00af044d3c819a20d9e759bcbfe3696d0b709cfc6e22f29f21ae6823591f1
-
Size
491KB
-
MD5
42811529431802dedef6de44ac6e3408
-
SHA1
2eca7e8a01307e9e5956bcd0532838fb2c8d298c
-
SHA256
e5e00af044d3c819a20d9e759bcbfe3696d0b709cfc6e22f29f21ae6823591f1
-
SHA512
8cbf63ef17edab5ad6fc15ec4fec252ad2ca9746caf98b2dfbee08a67a4453e2c1ecfa28d54e546314113fc6cb5fc8f092be8762a1b09309f183df33d5674024
-
SSDEEP
6144:fT8hKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDX:fT8hqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
e5e00af044d3c819a20d9e759bcbfe3696d0b709cfc6e22f29f21ae6823591f1.exe windows x86
f40f8276f090b55ca089bc12691d983e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetModuleFileNameW
IsBadStringPtrW
lstrlenA
TlsAlloc
DeviceIoControl
HeapDestroy
CloseHandle
GetDriveTypeA
CreateFileA
IsDebuggerPresent
CloseHandle
Sleep
CreateFileMappingW
ReleaseMutex
SetEvent
GetStartupInfoA
DeleteFileA
GetCommandLineA
HeapCreate
user32
IsWindow
CallWindowProcW
GetWindowLongA
DestroyMenu
IsZoomed
LoadImageA
DispatchMessageA
DrawTextW
PeekMessageA
FindWindowW
GetIconInfo
DispatchMessageA
DestroyWindow
cryptext
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ