Static task
static1
Behavioral task
behavioral1
Sample
e18ce1f50c6a9917b1539f27a4edc58ebbc3073dbb97b510c4e2134364c821f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e18ce1f50c6a9917b1539f27a4edc58ebbc3073dbb97b510c4e2134364c821f7.exe
Resource
win10v2004-20220812-en
General
-
Target
e18ce1f50c6a9917b1539f27a4edc58ebbc3073dbb97b510c4e2134364c821f7
-
Size
6KB
-
MD5
a9fa320c9f02a5decb0a1584a56ad3e4
-
SHA1
8469cc5eda6f4811c7f9b425e0f1e4e5728d08f6
-
SHA256
e18ce1f50c6a9917b1539f27a4edc58ebbc3073dbb97b510c4e2134364c821f7
-
SHA512
b518bb1394705bac07c5f509277aa2ce448519dbbccccc5782d4c948f63bce9d0ace0d9b5adfa98fd3e6102861eefd3760d9cd80df255923e3d83a16f6f2611f
-
SSDEEP
96:duMBwM5fvuxmt3OdPLIN4LfBfJd+WHOy/Mt08f8VBMcLMfwmvpChFMPtboynTanx:A+wg3uewjtfNlN/L5Cw6pC4P1oynKmm
Malware Config
Signatures
Files
-
e18ce1f50c6a9917b1539f27a4edc58ebbc3073dbb97b510c4e2134364c821f7.exe windows x86
9c7cab41bb6bf45f3b7a453e1064ea73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetModuleHandleA
lstrcmpiA
WinExec
SetFilePointer
CreateThread
GetStartupInfoA
ReadFile
GetCurrentProcess
GetLastError
CloseHandle
GetProcAddress
LoadLibraryA
Sleep
user32
DispatchMessageA
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
LoadCursorA
LoadIconA
DefWindowProcA
wsprintfA
advapi32
SetTokenInformation
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
OpenProcessToken
CreateProcessAsUserA
msvcrt
__getmainargs
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
??3@YAXPAX@Z
??2@YAPAXI@Z
_exit
_XcptFilter
exit
_acmdln
_strcmpi
_initterm
__setusermatherr
_adjust_fdiv
wtsapi32
WTSQueryUserToken
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE