Static task
static1
Behavioral task
behavioral1
Sample
e2dc9325fc1d232b5fd4e76d296c1623408e49b21051e54337f8f8b52d3b7beb.exe
Resource
win7-20221111-en
General
-
Target
e2dc9325fc1d232b5fd4e76d296c1623408e49b21051e54337f8f8b52d3b7beb
-
Size
3KB
-
MD5
a9bd37a82af5f2687f4144c2f748dfaa
-
SHA1
bc62cb767300908b98f1ababa9ab6bf6f50d6071
-
SHA256
e2dc9325fc1d232b5fd4e76d296c1623408e49b21051e54337f8f8b52d3b7beb
-
SHA512
d86ff21f46bf9d5559cd818ed17ab715ec92639c298deeb2fad8381ff28553b1f317e552dda1676ef7c68a86e3b881f6082c1d8425459f34993a93bbd125c53d
Malware Config
Signatures
Files
-
e2dc9325fc1d232b5fd4e76d296c1623408e49b21051e54337f8f8b52d3b7beb.exe windows x86
68ecf5ec842249dc6aa5d0f015290b48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
SetCurrentDirectoryA
SetFilePointer
TerminateProcess
GetSystemDefaultLangID
lstrcatA
lstrlenA
CloseHandle
GetPrivateProfileStringA
GetCurrentDirectoryA
ExitProcess
CreateFileA
WriteFile
user32
SetProcessWindowStation
OpenWindowStationA
OpenInputDesktop
GetWindowThreadProcessId
FindWindowA
wsprintfA
SetThreadDesktop
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 802B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE