Static task
static1
Behavioral task
behavioral1
Sample
e655dcbefe4ca5d5118cc1e5ee9c4c71522856af3a0232724b7fb87ec40dca9c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e655dcbefe4ca5d5118cc1e5ee9c4c71522856af3a0232724b7fb87ec40dca9c.exe
Resource
win10v2004-20221111-en
General
-
Target
e655dcbefe4ca5d5118cc1e5ee9c4c71522856af3a0232724b7fb87ec40dca9c
-
Size
498KB
-
MD5
c31f57f6a90ea5e8c782b5989d90eeb9
-
SHA1
f85ff1532bd548af4dd7e5421502eb228637414e
-
SHA256
e655dcbefe4ca5d5118cc1e5ee9c4c71522856af3a0232724b7fb87ec40dca9c
-
SHA512
51dd523abd1cf8e229614b1a997aa49e73a37ab9b936452949a4e55f14428d2caed7ae9cee6b21326a46b27c0c8fda1999a6f58f55c292e9d121c66e29ccace1
-
SSDEEP
6144:LimhvkZ8gulzV2V9/H5DTwaHd6dcNiXPnpUTJPyd+MElqwkp7:LioMZu2z96dcYXPnpcJPydjZ
Malware Config
Signatures
Files
-
e655dcbefe4ca5d5118cc1e5ee9c4c71522856af3a0232724b7fb87ec40dca9c.exe windows x86
bd270dd04c7865bd4d8206058a145d7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetStartupInfoA
GetFileAttributesA
DeleteFileA
lstrlenA
TlsAlloc
CreateFileA
GetModuleHandleA
IsDebuggerPresent
GetDriveTypeA
SuspendThread
IsBadStringPtrA
HeapCreate
ReleaseMutex
TlsGetValue
GetModuleFileNameW
GetACP
DeviceIoControl
PulseEvent
CreateFileMappingA
user32
DrawTextW
DestroyWindow
GetWindowLongA
FindWindowW
CallWindowProcW
IsWindow
DispatchMessageA
DispatchMessageA
DestroyMenu
IsZoomed
GetIconInfo
PeekMessageA
LoadImageA
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
cryptui
WizardFree
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ