Static task
static1
Behavioral task
behavioral1
Sample
e03e9669c61063147138fcd4b8734932a9a46c3c6bea69f5b0d911b785907625.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e03e9669c61063147138fcd4b8734932a9a46c3c6bea69f5b0d911b785907625.exe
Resource
win10v2004-20220901-en
General
-
Target
e03e9669c61063147138fcd4b8734932a9a46c3c6bea69f5b0d911b785907625
-
Size
305KB
-
MD5
53b397a47a9114dfcf0b23441abe6d40
-
SHA1
9f538b4853ba24ba0c56ea1b393b4298650fbc2e
-
SHA256
e03e9669c61063147138fcd4b8734932a9a46c3c6bea69f5b0d911b785907625
-
SHA512
c5be35c78cd06a0829ed84d626aadd600bb57509623842a119a838809e3d8747529fa98f77f17bea2a10dce5464344c78ccc27964884d0e1c99af452f2e94963
-
SSDEEP
6144:nawa2lnHHnHrLrLLrLrDebxNQNFOYfUVGQyPgkrc0yhIeXJzIm0vP4zs3ola2Pik:4D74kYGGzxrcVs4zmoY2PiHKdyE/
Malware Config
Signatures
Files
-
e03e9669c61063147138fcd4b8734932a9a46c3c6bea69f5b0d911b785907625.exe windows x86
4dbc481cfac0a8237bca52f70c4ea533
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetConsoleAliasA
CreateMailslotA
DeleteFileA
CreateFileMappingW
DeleteFileA
WriteConsoleW
SetVolumeLabelW
SetCurrentDirectoryA
DeleteFileA
GetStringTypeW
VirtualAlloc
CreateSemaphoreW
CreatePipe
GetModuleHandleW
GetStringTypeA
SetEnvironmentVariableA
FatalExit
GetACP
InitializeCriticalSection
GetShortPathNameW
LoadLibraryA
GetProcessHeap
mshtml
DllEnumClassObjects
ShowModelessHTMLDialog
ShowHTMLDialog
ShowModalDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ