Static task
static1
Behavioral task
behavioral1
Sample
e34fd9184584d97908221bfcbfb78807e72573bf9b0f2058a0824d36933e55fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e34fd9184584d97908221bfcbfb78807e72573bf9b0f2058a0824d36933e55fe.exe
Resource
win10v2004-20221111-en
General
-
Target
e34fd9184584d97908221bfcbfb78807e72573bf9b0f2058a0824d36933e55fe
-
Size
127KB
-
MD5
3e835be177c2c10c8c5fe0ceb245860b
-
SHA1
eea6294520d9daa7237baa10a556bd7b015b7428
-
SHA256
e34fd9184584d97908221bfcbfb78807e72573bf9b0f2058a0824d36933e55fe
-
SHA512
3af52796ba42e14ac3d00fc3a7c15882a0850106438f4ce44fc16820f8a5881a41262da54175fc3175dc648d54fac200a8690bbc057e0d57c60c1098d0c4ae04
-
SSDEEP
3072:iNnfR+iSISpE1gIJP7wykr1Bj/oJQ/2tDuqqv:iFZKE1gojfABj/F2hu
Malware Config
Signatures
Files
-
e34fd9184584d97908221bfcbfb78807e72573bf9b0f2058a0824d36933e55fe.exe windows x86
5dfa29f8bf24b9196ea99bada80052f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
MulDiv
AddAtomA
WaitForSingleObject
GetProcAddress
CreateFileMappingA
ResetEvent
CreateConsoleScreenBuffer
GlobalAddAtomA
FindFirstChangeNotificationA
GetCPInfoExA
BeginUpdateResourceA
LocalFlags
SizeofResource
UnmapViewOfFile
OpenMutexA
OpenProcess
GetEnvironmentStrings
OpenSemaphoreA
OpenFileMappingA
GetACP
GetProfileIntA
GetThreadLocale
PurgeComm
SetLastError
GlobalFree
GetProcessTimes
CreateRemoteThread
DeleteFileA
CreateIoCompletionPort
LocalUnlock
CreateEventA
GlobalAlloc
WritePrivateProfileSectionA
GetProcessHeap
WritePrivateProfileStructA
GetStdHandle
GlobalLock
GetCommandLineA
GetPrivateProfileSectionNamesA
GetCurrentThreadId
IsDebuggerPresent
LocalSize
GetSystemDefaultLangID
SetFilePointer
GetFileAttributesA
GetDriveTypeA
MapViewOfFile
WaitForMultipleObjectsEx
GetThreadTimes
FlushConsoleInputBuffer
VirtualProtectEx
CreateMailslotA
GetVersion
GetCurrentProcess
GetProcessVersion
DisconnectNamedPipe
VirtualLock
FindResourceA
VirtualAlloc
HeapCreate
GetModuleFileNameA
GetCommModemStatus
GetTickCount
SleepEx
GetCurrentProcessId
MapViewOfFileEx
ReleaseMutex
VirtualQueryEx
VirtualUnlock
FlushInstructionCache
ResumeThread
GetThreadPriorityBoost
GetExitCodeThread
MoveFileA
LockResource
IsProcessorFeaturePresent
FreeConsole
GlobalFlags
GetNamedPipeInfo
GetLastError
LoadResource
GetSystemDefaultUILanguage
GlobalCompact
GetThreadPriority
CopyFileExA
ClearCommError
CopyFileA
Sleep
DeleteFiber
GetPrivateProfileSectionA
ContinueDebugEvent
PeekNamedPipe
GetVolumeInformationA
CloseHandle
DuplicateHandle
IsBadReadPtr
GetConsoleOutputCP
GetProfileSectionA
HeapValidate
LocalAlloc
CreateFileA
SetEvent
CommConfigDialogA
IsBadHugeWritePtr
HeapReAlloc
FoldStringA
FindNextChangeNotification
GlobalWire
GetConsoleCursorInfo
GetFileInformationByHandle
GetDiskFreeSpaceA
ConnectNamedPipe
GetUserDefaultLangID
LocalHandle
FindResourceExA
LockFile
CreateDirectoryExA
GetSystemDefaultLCID
CallNamedPipeA
GetFileType
GetProcessWorkingSetSize
EndUpdateResourceA
GlobalFix
MultiByteToWideChar
CreateFiber
LocalLock
GetHandleInformation
GetModuleHandleA
GetCurrentThread
GetLongPathNameA
LocalReAlloc
VirtualFree
LocalFree
IsBadHugeReadPtr
WritePrivateProfileStringA
CancelIo
HeapAlloc
GetThreadContext
WideCharToMultiByte
IsBadWritePtr
SetFileTime
HeapDestroy
FreeResource
GetLocalTime
GlobalSize
GetStartupInfoA
msvcrt
rand
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE