Static task
static1
Behavioral task
behavioral1
Sample
1e647231c24f04f743475e57432e4733043a5d63bfc4fa58c49082cdead8e0a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e647231c24f04f743475e57432e4733043a5d63bfc4fa58c49082cdead8e0a9.exe
Resource
win10v2004-20221111-en
General
-
Target
1e647231c24f04f743475e57432e4733043a5d63bfc4fa58c49082cdead8e0a9
-
Size
100KB
-
MD5
0bd1f5e8a8b33cb3e15a67c4ca648820
-
SHA1
178fb7e5500066a826529ebc5b3e2984e1d4ed5f
-
SHA256
1e647231c24f04f743475e57432e4733043a5d63bfc4fa58c49082cdead8e0a9
-
SHA512
02c23b161eb10f5b4366c85ee640efd84b9b18b0dbfecc79e3470a40e3e21d2b9290d0098b3986445b3cf3c80759e70b53e4ecf3efeac72a5e319df6cf3ec2fe
-
SSDEEP
1536:WDMg8rVI2DgcgifMPvITVm20+74xEPBE3cYor8Jy:W/oVI2DHxMP2m2JEdF
Malware Config
Signatures
Files
-
1e647231c24f04f743475e57432e4733043a5d63bfc4fa58c49082cdead8e0a9.exe windows x86
19d54ea096c8638969f1c8f4b4667345
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_controlfp_s
_invoke_watson
_except_handler4_common
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_crt_debugger_hook
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
memset
kernel32
WriteFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetTempPathA
CloseHandle
GetModuleHandleA
GetModuleFileNameA
LockResource
GetProcAddress
lstrcatA
SizeofResource
Sleep
LoadResource
lstrlenA
FindResourceA
CreateFileA
user32
wsprintfA
MessageBoxA
GetCursorPos
shell32
ShellExecuteA
Sections
. Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE