Static task
static1
Behavioral task
behavioral1
Sample
e4b47f3329aa386f9de3ec0dc8b8210e48cd400ab4d0e232e94c7335cd1aeca4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4b47f3329aa386f9de3ec0dc8b8210e48cd400ab4d0e232e94c7335cd1aeca4.exe
Resource
win10v2004-20221111-en
General
-
Target
e4b47f3329aa386f9de3ec0dc8b8210e48cd400ab4d0e232e94c7335cd1aeca4
-
Size
91KB
-
MD5
a592e15c6a45bcfbe2daba0956da3aef
-
SHA1
7affd5afd1ff93dbcf68919ebe1183489bc94eaf
-
SHA256
e4b47f3329aa386f9de3ec0dc8b8210e48cd400ab4d0e232e94c7335cd1aeca4
-
SHA512
cff198168cc9c70ed8618af877f5cbd93bca4ac2c4580cd0ccc1de9d0a0abeb7b74b07df51f647ac8f478aff23a0b8af56e643b1ea8c0d558c6e98554d1dfad7
-
SSDEEP
1536:Z99uCCf8t06Id9ZiWX5gEM+8FFa4+S0P2s3KqT76:tK8q6Ios5jM+cFa4+SCPK86
Malware Config
Signatures
Files
-
e4b47f3329aa386f9de3ec0dc8b8210e48cd400ab4d0e232e94c7335cd1aeca4.exe windows x86
bad548965455c9a5c75153985ed6bacc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDllDirectoryW
CancelTimerQueueTimer
SetThreadExecutionState
CreateDirectoryA
DeleteAtom
WriteProcessMemory
GetExpandedNameW
GetThreadIOPendingFlag
ExitThread
GlobalUnWire
GetNamedPipeHandleStateA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 77KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE