Static task
static1
Behavioral task
behavioral1
Sample
e79b967a4e6c76ece7d8da2dc90b785f1e47dda0b5832892f50b4f1dc66daf21.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e79b967a4e6c76ece7d8da2dc90b785f1e47dda0b5832892f50b4f1dc66daf21.exe
Resource
win10v2004-20220812-en
General
-
Target
e79b967a4e6c76ece7d8da2dc90b785f1e47dda0b5832892f50b4f1dc66daf21
-
Size
126KB
-
MD5
da68e09477236d75477216847afdb79f
-
SHA1
175539e598ccfaaa047f58388f7c61cce0108599
-
SHA256
e79b967a4e6c76ece7d8da2dc90b785f1e47dda0b5832892f50b4f1dc66daf21
-
SHA512
5dac8149ff195b24d2415c5f10a89a866687487a82f529bf7f36f431a7e3e947968ee9fc9760232750eb3d29c146b2f5ade0e08f79850101b10179b64e4c27da
-
SSDEEP
3072:10hjrfCORhwhZcwrm4j8VAmPZQsHHV8eg1meKs40TpafEP3LGLS:1uuY+hZckjagsgtPLb
Malware Config
Signatures
Files
-
e79b967a4e6c76ece7d8da2dc90b785f1e47dda0b5832892f50b4f1dc66daf21.exe windows x86
de981fc6322663f1c24f35e9c5b39edb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
IsProcessorFeaturePresent
VirtualFreeEx
GetProcAddress
GetLongPathNameA
PostQueuedCompletionStatus
GlobalAlloc
GetProcessHeap
CreateMutexA
DeleteFiber
GetLastError
IsBadStringPtrA
LocalAlloc
GetUserDefaultLangID
GetTempPathA
AddAtomA
CreateEventA
CreateSemaphoreA
GetLargestConsoleWindowSize
ReleaseMutex
LocalFree
GetUserDefaultLCID
CopyFileA
QueryDosDeviceA
CallNamedPipeA
GlobalHandle
MulDiv
FreeLibrary
GetDiskFreeSpaceA
GetCPInfoExA
GlobalReAlloc
CreateRemoteThread
IsBadReadPtr
ClearCommBreak
CreateDirectoryA
ResumeThread
ReleaseSemaphore
GetEnvironmentVariableA
UnlockFile
SizeofResource
GetSystemDefaultLangID
GetPrivateProfileSectionA
GlobalUnfix
GlobalUnlock
GetCommTimeouts
MapViewOfFile
OpenMutexA
OpenProcess
GetPrivateProfileIntA
LocalLock
GetProfileSectionA
OutputDebugStringA
GetBinaryTypeA
GetOEMCP
LocalCompact
GetModuleHandleA
GlobalCompact
FindResourceExA
WritePrivateProfileSectionA
ResetEvent
VirtualLock
IsDebuggerPresent
GetFileSize
IsBadHugeWritePtr
VirtualProtectEx
GetCurrentProcess
GetProcessTimes
GetProcessWorkingSetSize
HeapDestroy
DisconnectNamedPipe
GetProcessVersion
FreeConsole
CreateIoCompletionPort
FoldStringA
IsBadHugeReadPtr
CloseHandle
GetEnvironmentStrings
GetProfileStringA
LocalHandle
CreateFiber
LocalUnlock
HeapAlloc
GetFileInformationByHandle
UnmapViewOfFile
GetTickCount
GetSystemDefaultUILanguage
CreateWaitableTimerA
ReadFile
CreateDirectoryExA
PeekConsoleInputA
HeapFree
FreeResource
WriteProcessMemory
ReadProcessMemory
SetFileTime
GetDiskFreeSpaceExA
VirtualFree
LoadLibraryExA
OpenFileMappingA
CreateMailslotA
ReadConsoleA
GetCommConfig
HeapCreate
GetCommMask
GetConsoleOutputCP
FindFirstChangeNotificationA
GetThreadLocale
VirtualProtect
WritePrivateProfileStringA
Beep
IsSystemResumeAutomatic
GetWindowsDirectoryA
DeleteFileA
InitAtomTable
PulseEvent
FindAtomA
MultiByteToWideChar
UpdateResourceA
CommConfigDialogA
GetLogicalDrives
FlushConsoleInputBuffer
WaitForMultipleObjectsEx
WaitNamedPipeA
GetFileAttributesA
WaitForSingleObjectEx
GetModuleFileNameA
GlobalUnWire
GetShortPathNameA
LocalFlags
GetLocalTime
LocalReAlloc
DeleteAtom
BeginUpdateResourceA
GlobalFindAtomA
MapViewOfFileEx
GetProfileIntA
GetVersion
GetFileType
GetMailslotInfo
SetLastError
CancelIo
MoveFileA
GetCommandLineA
GetStartupInfoA
msvcrt
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE