Static task
static1
Behavioral task
behavioral1
Sample
e4012454640c9035ee082d8bf61c9aa32328db333a652e4ca166a42177d83726.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4012454640c9035ee082d8bf61c9aa32328db333a652e4ca166a42177d83726.exe
Resource
win10v2004-20221111-en
General
-
Target
e4012454640c9035ee082d8bf61c9aa32328db333a652e4ca166a42177d83726
-
Size
19KB
-
MD5
52d4669a853943d358ff197c29ef4f59
-
SHA1
8f66a17a54770da7a5e337497b043ba13fa3e00d
-
SHA256
e4012454640c9035ee082d8bf61c9aa32328db333a652e4ca166a42177d83726
-
SHA512
640e9530dfc1fc610f1523d327ffbfb617fd793b5c035dc1dae38abb91a4a27fc00fb5a11190302b72f67b5f694e50e8f506ca84f2fca882248c6b81f55492e4
-
SSDEEP
192:knBoKanHq9NF5qvCMMGzXvBh4V5PFY68gkP9txYFnbUQwLNaQqNEe1f/v:CJ4K9JqvCMMBbbwcQqNEe1nv
Malware Config
Signatures
Files
-
e4012454640c9035ee082d8bf61c9aa32328db333a652e4ca166a42177d83726.exe windows x86
4dbb28b0d52b955d710eb8df9070eadf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
OpenEventA
SetEvent
Sleep
lstrcatA
DeleteFileA
lstrcpyA
GetCurrentProcess
GetModuleHandleW
GetProcAddress
CloseHandle
ExitProcess
GetModuleHandleA
GetCommandLineA
WriteFile
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
CreateFileA
GetFileAttributesA
GetTempPathA
CompareStringA
Process32First
TerminateProcess
RtlUnwind
InterlockedExchange
VirtualQuery
VirtualAlloc
HeapReAlloc
user32
wsprintfA
CharToOemA
MessageBoxA
ExitWindowsEx
ReleaseDC
DestroyWindow
IsWindow
gdi32
RestoreDC
advapi32
RegDeleteValueA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE