Static task
static1
Behavioral task
behavioral1
Sample
e6ef6b3629c36847c2b7ed7a5cca77afaf5c49c5b542530f1125bdce4337f3dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6ef6b3629c36847c2b7ed7a5cca77afaf5c49c5b542530f1125bdce4337f3dd.exe
Resource
win10v2004-20220812-en
General
-
Target
e6ef6b3629c36847c2b7ed7a5cca77afaf5c49c5b542530f1125bdce4337f3dd
-
Size
67KB
-
MD5
a9b898e8f0e50a8b35b9fc93063dd421
-
SHA1
fc02742d68c858ab82b968ccc779545415ae21db
-
SHA256
e6ef6b3629c36847c2b7ed7a5cca77afaf5c49c5b542530f1125bdce4337f3dd
-
SHA512
941bac5ae3377a2b0525971ef144d6df6793747ba6a1a0296e59c466e5d46cad51854707b7a6ae7df6bcc6c6a40e0009bddd6b3a9fa8f405f6861ad2ebbe2923
-
SSDEEP
1536:QYE6X9D8sMMOPAoKu/avRefffffIxqQ0nu8SJq:Qti90pPAoK60RpxqQ0n8q
Malware Config
Signatures
Files
-
e6ef6b3629c36847c2b7ed7a5cca77afaf5c49c5b542530f1125bdce4337f3dd.exe windows x86
fa85327a2e2f953933f22880e30fa898
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
FindResourceW
GetCurrentThreadId
CloseHandle
HeapCreate
PulseEvent
lstrlenA
Sleep
FindClose
GetCommandLineA
lstrcpyA
UnmapViewOfFile
GetModuleHandleA
LocalFree
SetLastError
GetComputerNameA
GetCurrentDirectoryA
CreateProcessA
GlobalUnlock
CreateFileW
user32
IsWindow
DrawMenuBar
DispatchMessageA
CheckRadioButton
CreateIcon
GetDC
DrawEdge
GetCaretPos
SetFocus
GetDlgItem
FillRect
CallWindowProcA
CreateWindowExA
rsaenh
CPGenKey
CPHashData
CPDecrypt
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE