Static task
static1
Behavioral task
behavioral1
Sample
e69cc087fd23d24590fccac2e226ba0032a398a3d418424771f33622b1fadaa3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e69cc087fd23d24590fccac2e226ba0032a398a3d418424771f33622b1fadaa3.exe
Resource
win10v2004-20220812-en
General
-
Target
e69cc087fd23d24590fccac2e226ba0032a398a3d418424771f33622b1fadaa3
-
Size
127KB
-
MD5
814ddb5e58322df65bad424c0dab0014
-
SHA1
33c64d23c6056e8e606c7ccabd9057c5c89efcda
-
SHA256
e69cc087fd23d24590fccac2e226ba0032a398a3d418424771f33622b1fadaa3
-
SHA512
b7e8da728567b09240cb2af1858e9704bc621489bebd79b1c75360d47724f926a6ec34f30b9d83e625ea1965aed347f8fced55a38d247662bcb4867a70026594
-
SSDEEP
3072:ejwVcdZSVHoKgwwba7yb+SwRCqXJWjQOJXD0GK3:ejQ6Kgw17/SwTZBO
Malware Config
Signatures
Files
-
e69cc087fd23d24590fccac2e226ba0032a398a3d418424771f33622b1fadaa3.exe windows x86
b10b81904df5ed492fb4e4df4a31f7b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
EndUpdateResourceA
GetHandleInformation
LocalSize
GetProcAddress
GlobalAddAtomA
GetTickCount
DeleteFiber
CommConfigDialogA
GetEnvironmentVariableA
FreeConsole
GetUserDefaultLCID
GetProfileIntA
GetCPInfoExA
GetProcessWorkingSetSize
MapViewOfFileEx
GetSystemDefaultLangID
WriteProfileStringA
EraseTape
SetFileTime
LocalLock
WriteProfileSectionA
FlushFileBuffers
GetCommandLineA
CancelWaitableTimer
SetEvent
VirtualLock
GetLongPathNameA
UpdateResourceA
MoveFileA
VirtualFreeEx
UnmapViewOfFile
CreateIoCompletionPort
ClearCommBreak
GetLogicalDrives
FindClose
WaitForSingleObjectEx
PostQueuedCompletionStatus
DuplicateHandle
GetExitCodeThread
GlobalFree
CancelIo
FlushConsoleInputBuffer
GetCurrentThread
CreateWaitableTimerA
CreateFiber
FindResourceA
FindAtomA
FreeLibrary
GetLastError
FormatMessageA
GlobalLock
ReleaseSemaphore
InitAtomTable
GetLocalTime
GetCurrentThreadId
CreateFileMappingA
IsBadStringPtrA
GlobalAlloc
GetDiskFreeSpaceExA
GetFileInformationByHandle
GetProfileStringA
Sleep
GetLargestConsoleWindowSize
GetProfileSectionA
LocalFree
LocalHandle
HeapCreate
WriteFile
DeviceIoControl
GetMailslotInfo
LoadLibraryExA
IsValidCodePage
LoadLibraryA
WaitForSingleObject
GetPrivateProfileSectionA
GlobalUnfix
GlobalUnlock
VirtualAllocEx
GetProcessHeap
HeapAlloc
GlobalFindAtomA
CreateRemoteThread
GetCurrentProcess
CopyFileExA
GlobalReAlloc
GetConsoleCP
GetNamedPipeInfo
WaitForMultipleObjects
VirtualAlloc
GetStdHandle
FlushInstructionCache
AreFileApisANSI
GlobalFix
MulDiv
LockFile
CopyFileA
WriteProcessMemory
GetConsoleOutputCP
GetFileSize
GetTempPathA
GetDriveTypeA
LocalReAlloc
ReleaseMutex
CallNamedPipeA
GetNamedPipeHandleStateA
VirtualProtectEx
WritePrivateProfileStructA
IsProcessorFeaturePresent
PurgeComm
OpenMutexA
OpenProcess
DisconnectNamedPipe
CreateEventA
QueueUserAPC
SetFilePointer
GetProcessHeaps
CreateDirectoryA
LocalShrink
GetThreadTimes
GetExitCodeProcess
GetSystemDirectoryA
VirtualQuery
GetSystemDefaultLCID
Beep
MapViewOfFile
PeekNamedPipe
FindResourceExA
SizeofResource
GetModuleHandleA
HeapFree
GetFileTime
FoldStringA
GetShortPathNameA
IsDebuggerPresent
LoadResource
GetConsoleCursorInfo
GetProcessTimes
CreateDirectoryExA
IsBadWritePtr
SignalObjectAndWait
CreateSemaphoreA
LocalUnlock
FindFirstChangeNotificationA
ResetEvent
GetVersion
ReadFile
OpenEventA
GlobalHandle
QueryPerformanceCounter
GetVolumeInformationA
GetStartupInfoA
msvcrt
rand
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE