Static task
static1
Behavioral task
behavioral1
Sample
e03477aa7e4f9e0d998fdbb501c453a65b996dfa9bc71689e12014725e854a85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e03477aa7e4f9e0d998fdbb501c453a65b996dfa9bc71689e12014725e854a85.exe
Resource
win10v2004-20220812-en
General
-
Target
e03477aa7e4f9e0d998fdbb501c453a65b996dfa9bc71689e12014725e854a85
-
Size
306KB
-
MD5
16fea2c835f5b831c80ab085e0f26340
-
SHA1
8b1bdafadb9f5b68c07ce75568d87795f3b0e1a8
-
SHA256
e03477aa7e4f9e0d998fdbb501c453a65b996dfa9bc71689e12014725e854a85
-
SHA512
2445eeb865637be5a0d3dc6415a48bdfade69003098c7480e1043cb297217ee126bdfbe8293b55367deaefdf9d7cfd826bba349e2d7984e64039059730336550
-
SSDEEP
6144:7zDlGtKoypToxzK0PdSc0AKYe8Z38YMLBwyXWDb4wG:7zboyuZzvpLLZ38YMLhXWQ
Malware Config
Signatures
Files
-
e03477aa7e4f9e0d998fdbb501c453a65b996dfa9bc71689e12014725e854a85.exe windows x86
3134f1719a542cdc1d7fd2a7e4b142de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
GetCurrentThreadId
LoadLibraryW
ReleaseMutex
GetCurrentProcessId
SetEvent
LocalFree
ResetEvent
lstrlenW
IsBadStringPtrA
GlobalFree
WriteFile
GetPrivateProfileStringA
HeapCreate
CreateEventW
CloseHandle
GetDriveTypeA
GetLocalTime
GetEnvironmentVariableW
GlobalFlags
user32
GetSysColor
DrawStateW
GetKeyboardType
CallWindowProcW
GetClassInfoA
CreateWindowExA
DispatchMessageA
GetClientRect
IsWindow
SetFocus
GetSysColor
GetCursorInfo
EndDialog
msident
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ