Static task
static1
Behavioral task
behavioral1
Sample
e181440bc1197e5cd03818998a6a35730e50554bda1c3829c9d7704ec96656dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e181440bc1197e5cd03818998a6a35730e50554bda1c3829c9d7704ec96656dd.exe
Resource
win10v2004-20221111-en
General
-
Target
e181440bc1197e5cd03818998a6a35730e50554bda1c3829c9d7704ec96656dd
-
Size
475KB
-
MD5
526b18dca68e4a7a38eb846bbffabca8
-
SHA1
6f46d5350b3f6ac2cdc619146db6b21e8cfce78d
-
SHA256
e181440bc1197e5cd03818998a6a35730e50554bda1c3829c9d7704ec96656dd
-
SHA512
4565290482840c3bc9b7d658531098e94f08b1f57a1a46cb6790ac15cb809f610501390b0db9d72ad407ca1098402d09ef3547f68cae7f81f71d4559a7f9f0b5
-
SSDEEP
12288:aT17DxoaSKpN6r0iVcH9h7AMq4+H0WYw1stXO4H:aT1fx0KpNGJcdh7AMPWYw1ep
Malware Config
Signatures
Files
-
e181440bc1197e5cd03818998a6a35730e50554bda1c3829c9d7704ec96656dd.exe windows x86
b3ccf61aa77a0114c8358064e0e025f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevExA
CharPrevA
CharUpperW
CharNextA
CharUpperA
oleaut32
VariantCopy
VariantClear
SysAllocString
SysFreeString
kernel32
FileTimeToSystemTime
CompareFileTime
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
MoveFileA
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SearchPathA
SearchPathW
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
FindClose
FindFirstFileA
FindFirstFileW
SetLastError
FindNextFileA
FindNextFileW
CreateFileA
CreateFileW
CloseHandle
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
LCMapStringA
LCMapStringW
CreateEventA
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
WaitForSingleObject
WaitForMultipleObjects
OpenEventA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetProcAddress
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
CreateThread
DeleteCriticalSection
InitializeCriticalSection
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTickCount
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
ExitProcess
SetUnhandledExceptionFilter
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetHandleCount
GetFileType
GetStartupInfoA
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ