Static task
static1
Behavioral task
behavioral1
Sample
e6b777e324507b1bfae3181b9cb693e0108a705b4b887b6795108de7b994e617.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6b777e324507b1bfae3181b9cb693e0108a705b4b887b6795108de7b994e617.exe
Resource
win10v2004-20221111-en
General
-
Target
e6b777e324507b1bfae3181b9cb693e0108a705b4b887b6795108de7b994e617
-
Size
305KB
-
MD5
0c59277c0c2b31aa818f161c2f4c9390
-
SHA1
2171f4422be8600ad2e013cde3e6fa59804282e7
-
SHA256
e6b777e324507b1bfae3181b9cb693e0108a705b4b887b6795108de7b994e617
-
SHA512
0d65eddf74918a050029baedfcffb2a8991e3a30d92117938e94cc05ad54cad5d28fd67ebda519507a2effd6e8c1065a9032f510b3c606390b40f74e76079a60
-
SSDEEP
6144:xradHeX36BxEKanWyEHJhjbW4X/aVDhciBQtxGCgYUhJxedv6778jOSOGAh:xY39anuJBni1hciBkTgVO4SOLh
Malware Config
Signatures
Files
-
e6b777e324507b1bfae3181b9cb693e0108a705b4b887b6795108de7b994e617.exe windows x86
567f3dcec6db5a118433be8f09422ade
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
FindAtomW
CreateMailslotA
GetModuleHandleA
GetCurrentThreadId
SetLastError
GetCurrentProcessId
GetFileAttributesA
GetPrivateProfileStringW
LocalFree
GetDriveTypeW
FindClose
SetEvent
ReadFile
lstrlenA
GetConsoleAliasW
GetModuleFileNameA
EnumCalendarInfoW
EnterCriticalSection
HeapCreate
user32
GetClassInfoA
DrawTextW
CallWindowProcW
GetKeyState
GetSysColor
GetMenuInfo
DispatchMessageA
IsWindow
GetClientRect
GetKeyboardType
DispatchMessageA
GetCursorInfo
SetFocus
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ