Static task
static1
Behavioral task
behavioral1
Sample
e185ad4853c6b7d9f6a590057b997591e7e9e3a05ac3d328bdaf552807843dbe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e185ad4853c6b7d9f6a590057b997591e7e9e3a05ac3d328bdaf552807843dbe.exe
Resource
win10v2004-20221111-en
General
-
Target
e185ad4853c6b7d9f6a590057b997591e7e9e3a05ac3d328bdaf552807843dbe
-
Size
24KB
-
MD5
5e8fc69c38d71641dd7932f04f15676f
-
SHA1
bc4cff71a9c0ddef0e7ee9e638abf5df91c69151
-
SHA256
e185ad4853c6b7d9f6a590057b997591e7e9e3a05ac3d328bdaf552807843dbe
-
SHA512
62b7554d6b6548a9d18474b1e449025078fdd572ec6fad9cb842627b1ca686f9dc67536146f2adcb5ea9f9205fc4353780c71d62915d1bef9debe9228833a43b
-
SSDEEP
384:1d9BTKxjANmywg42ndv8TUy5rpcbr1tyEznFELYVA+gMqiGzCW3N8xrKoD8h:vZNMgrxjyoDzFELgRg2jW3Mi
Malware Config
Signatures
Files
-
e185ad4853c6b7d9f6a590057b997591e7e9e3a05ac3d328bdaf552807843dbe.exe windows x86
14384745cc5298ff0f0928ceb14c6c31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastConsoleEventActive
DeleteAtom
GetNumberFormatA
SetFirmwareEnvironmentVariableA
IsDebuggerPresent
GetMailslotInfo
GetPrivateProfileSectionNamesA
SetFileAttributesA
VirtualAlloc
GetDiskFreeSpaceExA
SetConsolePalette
SetConsoleCursorInfo
SetConsoleInputExeNameA
DeleteTimerQueueTimer
GetLocaleInfoA
GetProcessWorkingSetSize
CreateMutexA
GetNamedPipeInfo
MoveFileExA
GetConsoleMode
EnumResourceNamesA
SetErrorMode
VirtualProtectEx
RegisterWaitForInputIdle
UnlockFileEx
WriteConsoleInputA
GlobalMemoryStatus
LZOpenFileA
ReadConsoleOutputCharacterA
LZDone
GetFileSize
GetCommTimeouts
GetThreadLocale
GetVersionExA
MoveFileWithProgressA
ReleaseSemaphore
UpdateResourceA
AddAtomA
OpenJobObjectA
LZCopy
RaiseException
GetConsoleTitleA
SetComputerNameExA
FindFirstChangeNotificationA
IsBadReadPtr
DeleteTimerQueueEx
ResetWriteWatch
GlobalFlags
GetConsoleCommandHistoryLengthA
DebugBreak
GetLogicalDriveStringsA
OpenEventA
_lread
WritePrivateProfileSectionA
LocalAlloc
GetProcessTimes
ReadFileEx
GetVolumePathNameA
GetDiskFreeSpaceA
ConnectNamedPipe
DefineDosDeviceA
ChangeTimerQueueTimer
GetFileAttributesExA
GetModuleFileNameA
GetThreadTimes
GlobalSize
FindClose
WriteConsoleOutputCharacterA
GetDefaultCommConfigA
IsValidCodePage
CreateNamedPipeA
GetProcessHeaps
CreateTimerQueueTimer
SetFilePointer
ReadConsoleA
CancelWaitableTimer
SetInformationJobObject
FlushViewOfFile
GetFileTime
WriteProfileSectionA
GetProcessId
SetFileAttributesA
GetVolumePathNameA
FindFirstVolumeMountPointA
_lwrite
GetCurrentThreadId
GlobalFindAtomA
DeleteTimerQueueTimer
SetFileValidData
GetEnvironmentStringsA
EnumResourceLanguagesA
GetVersionExA
GetVolumePathNameA
GetNativeSystemInfo
GetQueuedCompletionStatus
VirtualAllocEx
OpenWaitableTimerA
SetFirmwareEnvironmentVariableA
GetFileAttributesExA
DeleteTimerQueue
GetDllDirectoryA
GetPrivateProfileStringA
ReplaceFile
IsBadStringPtrA
WideCharToMultiByte
lstrlenA
GetUserDefaultLCID
FindFirstVolumeMountPointW
WriteFileEx
PurgeComm
CreateThread
SetEnvironmentVariableA
GetFullPathNameA
PurgeComm
GetWindowsDirectoryA
UpdateResourceA
GetVolumeInformationA
ResetEvent
UnlockFile
DeleteTimerQueueEx
FatalExit
LocalHandle
CallNamedPipeA
FindAtomA
GetWindowsDirectoryA
GetThreadIOPendingFlag
GlobalGetAtomNameA
GetLocaleInfoA
GetNumberOfConsoleInputEvents
SetConsoleCursorMode
OpenWaitableTimerA
GetStdHandle
GetCurrentDirectoryA
GetSystemDirectoryA
WritePrivateProfileStringA
ReadConsoleOutputCharacterA
GetProcAddress
lstrcpyn
GetThreadContext
GetDevicePowerState
GetProcessHeaps
BuildCommDCBAndTimeoutsA
lstrcmpA
ReadConsoleA
ReadConsoleA
GetProcessHeap
FlushFileBuffers
GetAtomNameA
GetSystemDirectoryA
GetLastError
TransmitCommChar
GetSystemTime
IsValidLanguageGroup
SetProcessPriorityBoost
GetVersionExA
GetProcessShutdownParameters
GetFileInformationByHandle
lstrcatA
TerminateThread
SetTapeParameters
SetDllDirectoryA
IsProcessorFeaturePresent
GlobalHandle
FillConsoleOutputCharacterA
HeapSize
IsBadHugeReadPtr
CopyFileA
CompareStringA
GetPrivateProfileIntA
GetCurrentThread
lstrcmpi
HeapDestroy
WriteConsoleOutputA
IsValidLocale
IsBadCodePtr
GetConsoleMode
IsSystemResumeAutomatic
SetSystemPowerState
FlushInstructionCache
GetProfileIntA
GetShortPathNameA
DeleteTimerQueue
FlushConsoleInputBuffer
SetSystemPowerState
IsBadCodePtr
ResetEvent
SetInformationJobObject
GetConsoleWindow
CommConfigDialogA
HeapSize
SetCalendarInfoA
FlushViewOfFile
SetCommMask
lstrcmpiA
GetProcessId
GetLogicalDrives
_lread
GetDriveTypeA
ClearCommBreak
FindNextVolumeA
PeekConsoleInputA
CreateFileA
GetLogicalDriveStringsA
GetTickCount
SetPriorityClass
FlushConsoleInputBuffer
GetFileInformationByHandle
ReadConsoleOutputCharacterA
GetConsoleCursorInfo
LoadResource
CreateFileA
GetCommandLineA
GetPriorityClass
GetConsoleCursorInfo
GetFileAttributesExA
UnlockFileEx
GetLongPathNameA
FindNextVolumeMountPointA
SignalObjectAndWait
WriteConsoleOutputA
GetExitCodeProcess
CreateWaitableTimerA
GetSystemInfo
GetLocalTime
GetDevicePowerState
GetCommandLineA
GetLogicalDrives
GetCommandLineA
ClearCommBreak
GetDriveTypeA
FindFirstVolumeA
_llseek
GetFileSizeEx
ws2_32
WSAEventSelect
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE