Static task
static1
Behavioral task
behavioral1
Sample
e0541600fe7ef964b75b3877d51fc255536fd785adecb410e0b07cb799651ff4.exe
Resource
win7-20220812-en
General
-
Target
e0541600fe7ef964b75b3877d51fc255536fd785adecb410e0b07cb799651ff4
-
Size
120KB
-
MD5
a2946bd1c9b3330c6c2ec8c15a5fe389
-
SHA1
a727e9de8119b6a2c1e8b84c670fcaed32e1614d
-
SHA256
e0541600fe7ef964b75b3877d51fc255536fd785adecb410e0b07cb799651ff4
-
SHA512
5ed4bd25a36ef9b60fd9c6da04193ce9fdf5d7969b7bcd760e6be19ab53cdcb625654d66c5afd76c0dbce835f31d4a11aa0739fb0abe7c07359c78982ce62a58
-
SSDEEP
1536:MU4FBvZmU/whK1KYS3MQemeZNx5YXi6HUK5GbPytK2M0sZVY9Ga2uT3o2/:zEc2whKtS3iNx5Y6zy82aYLf/
Malware Config
Signatures
Files
-
e0541600fe7ef964b75b3877d51fc255536fd785adecb410e0b07cb799651ff4.exe windows x86
7b8621a630d44933de49b87f705b421e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
InterlockedDecrement
GetStringTypeW
GetExitCodeProcess
WaitForSingleObject
GetLongPathNameA
Heap32First
FindResourceW
ExitProcess
lstrcpyW
LoadLibraryA
GetDiskFreeSpaceW
GetPrivateProfileIntA
GetCurrentDirectoryA
ReadFileEx
SetEnvironmentVariableA
InterlockedIncrement
GetPrivateProfileSectionA
lstrcmpA
GetDiskFreeSpaceW
GetACP
HeapCreate
GetModuleHandleW
apphelp
ApphelpCheckExe
SdbCreateMsiTransformFile
ApphelpCheckIME
AllowPermLayer
clbcatq
SetSetupSave
CheckMemoryGates
CheckMemoryGates
ComPlusMigrate
SetSetupSave
ComPlusMigrate
SetupOpen
SetupOpen
ComPlusMigrate
DllGetClassObject
CheckMemoryGates
DllGetClassObject
SetupOpen
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE