Static task
static1
Behavioral task
behavioral1
Sample
e3724eaeeb33289ce2b3678770f68b971b7c500dbb3981aea312ee1ae6f8469d.exe
Resource
win7-20220812-en
General
-
Target
e3724eaeeb33289ce2b3678770f68b971b7c500dbb3981aea312ee1ae6f8469d
-
Size
448KB
-
MD5
f1661344aca3faa2ea263095bc93e1c1
-
SHA1
26d6addcada7c9926f1143a8ffb8e3a7e4b14bd1
-
SHA256
e3724eaeeb33289ce2b3678770f68b971b7c500dbb3981aea312ee1ae6f8469d
-
SHA512
4ee8cfbc8477362f27f63da4e157bb31c00a18ab16ef06138402fd5d049f46c69a26f035959d445b6a42768acb71418c9e85bbac0018c19ea5d68f6f6a9b7c07
-
SSDEEP
12288:Q+VG+oEAYoawT6vK9XJjlyZ0GPBzWC4CL:3o3h+vKlgxn4C
Malware Config
Signatures
Files
-
e3724eaeeb33289ce2b3678770f68b971b7c500dbb3981aea312ee1ae6f8469d.exe windows x86
95e5bfd2ae036fbb9a0537ff4b3f4aea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
GetComputerNameA
GetVolumeInformationA
GetDriveTypeA
LoadResource
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
LockResource
SizeofResource
FreeResource
GetModuleFileNameA
FreeLibrary
GetShortPathNameA
user32
FindWindowA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
shell32
ShellExecuteA
msvcrt
_XcptFilter
strcat
strcpy
strlen
fclose
fread
malloc
ftell
fseek
fopen
strncpy
sprintf
exit
fwrite
memcpy
free
sscanf
strncat
realloc
_exit
memcmp
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
wininet
FindNextUrlCacheEntryA
InternetOpenUrlA
InternetOpenA
FindCloseUrlCache
InternetCloseHandle
FindFirstUrlCacheEntryA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 420KB - Virtual size: 417KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ