Static task
static1
Behavioral task
behavioral1
Sample
e217ee8c8974eed0dc2c028acc325f1f36b06ed5e46f6d8c79112e892bc2f091.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e217ee8c8974eed0dc2c028acc325f1f36b06ed5e46f6d8c79112e892bc2f091.exe
Resource
win10v2004-20221111-en
General
-
Target
e217ee8c8974eed0dc2c028acc325f1f36b06ed5e46f6d8c79112e892bc2f091
-
Size
283KB
-
MD5
427003eef0a77573b595a1acc7ec6c5d
-
SHA1
bf9900a2b777f112fceb3bcbfbfe329b865a4ec1
-
SHA256
e217ee8c8974eed0dc2c028acc325f1f36b06ed5e46f6d8c79112e892bc2f091
-
SHA512
999a270ff6bbe2becb797a6d8162cbe6317e12962e6a289d320510e9fde076abc4f4d11baed8f1219a42713f573530e2ce7964788ec62568955c20e8e630f050
-
SSDEEP
6144:VFTbZMQvDpB7wY4n74fHyjZRVkc4py7u/qbWhpY1:VDbvVZu7WoZRVAcu/qqhpY1
Malware Config
Signatures
Files
-
e217ee8c8974eed0dc2c028acc325f1f36b06ed5e46f6d8c79112e892bc2f091.exe windows x86
641f55d89cd96b75c8269e4a5e7be8ae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryW
lstrcatW
CreateFileW
CloseHandle
VirtualAllocEx
WriteFile
GetModuleHandleW
GetProcAddress
advapi32
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ