Static task
static1
Behavioral task
behavioral1
Sample
e41291b44b2cb7987e8245a154949b50864b97b97767588aebedf1cc7ff7ff8b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e41291b44b2cb7987e8245a154949b50864b97b97767588aebedf1cc7ff7ff8b.exe
Resource
win10v2004-20221111-en
General
-
Target
e41291b44b2cb7987e8245a154949b50864b97b97767588aebedf1cc7ff7ff8b
-
Size
81KB
-
MD5
03ee1845c4711ccb62b1111427a9b9a6
-
SHA1
882e797f014002d029f92b328523d132621ad6d7
-
SHA256
e41291b44b2cb7987e8245a154949b50864b97b97767588aebedf1cc7ff7ff8b
-
SHA512
73510ab3d756d9ec88384a74738431841a6db21c4e9edac6f9c138cb88a029f30eb61fd1476794ddfce6816b746a96db6ea7bb3752c7937783922b9aa591df2a
-
SSDEEP
1536:FLjuaRPulw3Q37/cMZznQxy8Z1Qucgb9vLJh0taReiDGjw:1jXYwA37/pbX8Z1TB9jJhqa9DGjw
Malware Config
Signatures
Files
-
e41291b44b2cb7987e8245a154949b50864b97b97767588aebedf1cc7ff7ff8b.exe windows x86
56c886de19a47b2a1aae007a5f8430fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ResetEvent
CloseHandle
GetCommandLineA
HeapCreate
TlsGetValue
lstrlenA
DeleteFileW
HeapDestroy
GetCommandLineA
GetStartupInfoA
VirtualQuery
CancelIo
CreateEventA
Sleep
GetTimeFormatA
GetModuleHandleA
GetVolumePathNameA
FindResourceW
GetEnvironmentVariableA
user32
GetSysColor
PeekMessageA
GetWindowLongA
DispatchMessageA
GetClassInfoA
CreateIcon
DrawTextW
DispatchMessageA
FindWindowA
CallWindowProcA
DestroyMenu
IsZoomed
IsWindow
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE