Static task
static1
Behavioral task
behavioral1
Sample
e0a0be87af007022a6117b332263c3496c5455cfa2b442390c2d16343556391d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0a0be87af007022a6117b332263c3496c5455cfa2b442390c2d16343556391d.exe
Resource
win10v2004-20220812-en
General
-
Target
e0a0be87af007022a6117b332263c3496c5455cfa2b442390c2d16343556391d
-
Size
532KB
-
MD5
9af78224d1d4d36ab72b52cd5dbe0736
-
SHA1
cdc754f5094aa53ceaf08d65e94d78011049bb2a
-
SHA256
e0a0be87af007022a6117b332263c3496c5455cfa2b442390c2d16343556391d
-
SHA512
bd1d93f6b7e739cf08a5d1005dca62829bb25884f9653ffabb37fe38bb0d8cab7be35889a851d0a6c26055a083c6b5c5d9a46bebfc040b10a6af88acd2415d37
-
SSDEEP
6144:oJJEtnTxhAp080KqKoePaiihVLndGbpa1t2UWfwkSHcfVd+3mcbcI9fYb8phbMsv:oJKtnTx7KqKoe8YY1gTMabV99
Malware Config
Signatures
Files
-
e0a0be87af007022a6117b332263c3496c5455cfa2b442390c2d16343556391d.exe windows x86
33b55dc74801871e9f454179bb62bd42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCPInfo
GetComputerNameW
OutputDebugStringW
GetModuleHandleW
VirtualFree
GetProcessHeap
lstrlenW
GetLastError
lstrlenA
VirtualAlloc
OutputDebugStringA
GetVersion
HeapReAlloc
IsProcessorFeaturePresent
RtlUnwind
LoadLibraryW
GetComputerNameA
GetCurrentDirectoryW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
HeapFree
Sleep
HeapAlloc
HeapSize
user32
LoadCursorW
GetCursorPos
GetMessageTime
LoadBitmapA
advapi32
RegOpenKeyExA
GetCurrentHwProfileW
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ