Static task
static1
Behavioral task
behavioral1
Sample
e2a12de28b4d318b49e751e87a0dc40d16ddbcf2ace0f931914139add92c6e10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2a12de28b4d318b49e751e87a0dc40d16ddbcf2ace0f931914139add92c6e10.exe
Resource
win10v2004-20220812-en
General
-
Target
e2a12de28b4d318b49e751e87a0dc40d16ddbcf2ace0f931914139add92c6e10
-
Size
241KB
-
MD5
5a806a72837e7dff5fd91e1ce59df201
-
SHA1
42c24885914a18c191b243a851ea118e07b6c6b6
-
SHA256
e2a12de28b4d318b49e751e87a0dc40d16ddbcf2ace0f931914139add92c6e10
-
SHA512
72c63cd68f85d64a789fb50c2bd4dde52f5d07895368f5663d065905ca82269b54add9ce8c7b7f5bb813a577cd6b6069dfb5c715685abed30e59367ff96b8fff
-
SSDEEP
3072:X7PBbB4HfmhZOGjzmTfwQaIvDL3UZ50beEPDELg:X75BgfmhQ+SnL3k5WDE
Malware Config
Signatures
Files
-
e2a12de28b4d318b49e751e87a0dc40d16ddbcf2ace0f931914139add92c6e10.exe windows x86
9058607b4021ef3ec141cd81a8ba5f19
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
GlobalFlags
GetThreadTimes
WriteConsoleInputW
FindNextFileW
Thread32Next
ReadConsoleA
Process32First
AddAtomW
Heap32ListFirst
GetBinaryTypeA
WritePrivateProfileSectionW
GetCommMask
ExpandEnvironmentStringsA
SetLocaleInfoW
EscapeCommFunction
EnumTimeFormatsW
CallNamedPipeW
SetConsoleActiveScreenBuffer
GetCommTimeouts
FindCloseChangeNotification
GetBinaryTypeA
SetThreadExecutionState
GetPrivateProfileSectionA
SetNamedPipeHandleState
GetTimeFormatW
GlobalGetAtomNameA
CreateConsoleScreenBuffer
GetProcessAffinityMask
GetProcessShutdownParameters
LocalFlags
SetHandleInformation
Process32First
LocalShrink
CreateHardLinkW
IsBadWritePtr
WritePrivateProfileSectionA
ClearCommBreak
CreatePipe
user32
GetWindowRgn
CreateDialogParamA
RegisterClassExW
PostThreadMessageA
SetWindowsHookW
EnumDisplaySettingsExW
CharPrevW
SetWindowTextA
CallNextHookEx
FindWindowExW
TranslateAcceleratorA
FindWindowA
UpdateWindow
IsZoomed
FindWindowExA
SetProcessWindowStation
WINNLSEnableIME
CreateWindowExA
WINNLSGetEnableStatus
DdeCmpStringHandles
UnhookWindowsHookEx
GetTitleBarInfo
MonitorFromPoint
Sections
.text Size: 223KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.alt Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE