Static task
static1
Behavioral task
behavioral1
Sample
e7a0a1487c5502b5374041ce937069a4c7ade7c015dc489ba50d2e22bf6ffe3f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7a0a1487c5502b5374041ce937069a4c7ade7c015dc489ba50d2e22bf6ffe3f.exe
Resource
win10v2004-20220812-en
General
-
Target
e7a0a1487c5502b5374041ce937069a4c7ade7c015dc489ba50d2e22bf6ffe3f
-
Size
125KB
-
MD5
c789d6388a008e57ab3fd2d59ba4911a
-
SHA1
34435ac086e930e8dd9fe5d8215b9fe562a746e8
-
SHA256
e7a0a1487c5502b5374041ce937069a4c7ade7c015dc489ba50d2e22bf6ffe3f
-
SHA512
596193b2405dc921e8d43e4b87947e65a31780f8884f46601e93516fa9f182575ae15bc037b9f6ea01c32d10b72c58e39ef34f43602217c567de4ea57c2f52dd
-
SSDEEP
3072:Mib3EVwoPlfk/SiVDHsV9nCDd0kAK7sSs:rAVwo1k5V09jkAWsh
Malware Config
Signatures
Files
-
e7a0a1487c5502b5374041ce937069a4c7ade7c015dc489ba50d2e22bf6ffe3f.exe windows x86
54968207b857becb04fc87cb4aac99ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStockObject
user32
SetWindowLongA
SetWindowTextA
CreateWindowExA
SetForegroundWindow
TranslateMessage
UpdateWindow
SendMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
LoadCursorA
GetWindowTextLengthA
GetWindowTextA
GetSystemMetrics
GetMessageA
GetDlgItem
GetDlgCtrlID
EnableWindow
DispatchMessageA
ShowWindow
DefWindowProcA
CallWindowProcA
SetWindowWord
kernel32
FlushFileBuffers
CreateFileA
CloseHandle
VirtualProtect
Sleep
RtlZeroMemory
LoadLibraryA
GetModuleHandleA
GetLastError
GetCurrentDirectoryA
GetCommandLineA
ExitProcess
CreateThread
WriteFile
comdlg32
GetSaveFileNameA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE