Static task
static1
Behavioral task
behavioral1
Sample
e365b17f0e79e528d1ae24047e601dc918878ab6e2db19b32eae75ff63d7922e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e365b17f0e79e528d1ae24047e601dc918878ab6e2db19b32eae75ff63d7922e.exe
Resource
win10v2004-20220812-en
General
-
Target
e365b17f0e79e528d1ae24047e601dc918878ab6e2db19b32eae75ff63d7922e
-
Size
244KB
-
MD5
62743f92605e7e78898ca51a3d10a6ca
-
SHA1
b83672b07bd38b3839ff1540cc67603947126747
-
SHA256
e365b17f0e79e528d1ae24047e601dc918878ab6e2db19b32eae75ff63d7922e
-
SHA512
bb48e4e68403f4207a5ab865dc15367607eff9d45dc3b8c93772dfc9bf4e62a147020331d6044f6b8312187110377e871777f47b478f14ecf5e1da78055ce638
-
SSDEEP
6144:1kHCb1Sv17gTNQ7h2Yp3A28ceqLS+yZQqgPo87m:1k81Sd4Nah2sw28ceF+yZT+o8
Malware Config
Signatures
Files
-
e365b17f0e79e528d1ae24047e601dc918878ab6e2db19b32eae75ff63d7922e.exe windows x86
074383fc16620ae124bd41a6116d67b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetFileTime
_lclose
LocalAlloc
LocalFree
_lopen
_lread
GetLastError
_lwrite
_llseek
GetFileAttributesA
GetFileAttributesW
GetCurrentDirectoryW
GetTempPathW
WideCharToMultiByte
MultiByteToWideChar
FormatMessageW
WaitForSingleObject
CreateThread
GetACP
LoadLibraryA
GetProcAddress
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
_lcreat
GetLocaleInfoW
GetVersionExW
CreateFileW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
LoadResource
FindResourceExW
lstrcmpA
GetStringTypeW
GetFileTime
lstrlenA
GlobalAlloc
GlobalFree
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapSetInformation
SetThreadUILanguage
GetConsoleOutputCP
lstrcmpiW
lstrcmpiA
GetFullPathNameW
RaiseException
GetFullPathNameA
FreeLibrary
IsDBCSLeadByte
msvcrt
_snprintf
_itoa
ferror
__badioinfo
_fileno
_lseeki64
_write
_isatty
bsearch
_wcsicmp
isleadbyte
__mb_cur_max
__pioinfo
mbtowc
_controlfp
?terminate@@YAXXZ
memset
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__getmainargs
_errno
??3@YAXPAX@Z
memcpy
malloc
free
_vsnprintf
_wsetlocale
fflush
_iob
fputs
toupper
printf
_vsnwprintf
wcsncmp
_wcsnicmp
ntdll
RtlUnwind
RtlMultiByteToUnicodeN
NlsMbCodePageTag
user32
CharLowerA
LoadStringA
CharToOemA
LoadStringW
cabinet
ord23
ord20
ord21
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE