Static task
static1
Behavioral task
behavioral1
Sample
e8baf74b33cfda803f5b211757e6451644ab231cb404209def9cbdabeb3fcee2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8baf74b33cfda803f5b211757e6451644ab231cb404209def9cbdabeb3fcee2.exe
Resource
win10v2004-20220901-en
General
-
Target
e8baf74b33cfda803f5b211757e6451644ab231cb404209def9cbdabeb3fcee2
-
Size
9KB
-
MD5
99e3350d7e1961614bdd831fb8446534
-
SHA1
5979f1616463a88e7d7e7b8392c6dde06fddfce4
-
SHA256
e8baf74b33cfda803f5b211757e6451644ab231cb404209def9cbdabeb3fcee2
-
SHA512
61234837df6811a71f0beadb6868e3d28dd864437b3c6b5f665c1f9f7204ec1b5e72440f5f9d5461867e60ad94c261debc204ab39dd88701bce325116ba74801
-
SSDEEP
192:OKSl0vTnD+dHX7lBkIdPGsL2rhAiHXYO1545i/p4bw:OcvbcrlugTW4k4bw
Malware Config
Signatures
Files
-
e8baf74b33cfda803f5b211757e6451644ab231cb404209def9cbdabeb3fcee2.exe windows x86
fb3b4b84ab2600430c7f258e65482aea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
GetCurrentThreadId
HeapDestroy
ExitProcess
GetModuleFileNameA
GetTickCount
HeapAlloc
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
WriteFile
CloseHandle
CreateFileA
GetFileSize
SetFilePointer
ReadFile
HeapReAlloc
user32
GetInputState
PostThreadMessageA
GetMessageA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.code Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ