Static task
static1
Behavioral task
behavioral1
Sample
e015fdb968376068124b847e47842ca3c00df17d19331b783b3aed1c0363ad8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e015fdb968376068124b847e47842ca3c00df17d19331b783b3aed1c0363ad8a.exe
Resource
win10v2004-20220812-en
General
-
Target
e015fdb968376068124b847e47842ca3c00df17d19331b783b3aed1c0363ad8a
-
Size
91KB
-
MD5
e28726cce156388b0b7df41c1b443d85
-
SHA1
b663d4eb0e602a3660be6499b5f56a162ad22d93
-
SHA256
e015fdb968376068124b847e47842ca3c00df17d19331b783b3aed1c0363ad8a
-
SHA512
3499a1755bcfbb6461202bff213c16ee8cca3979f493c9ca4cf4ef5f4187b8659b22e42cf283a01459ae1968fee780b4ea52085a1d56c25fdafb2af95a791d30
-
SSDEEP
1536:CoXQUSqTXb5ZzsvppAuHha5G2mU4arETlY0mnifEclpRwB1:VQUSqDb/0ppwWarbc5lpGr
Malware Config
Signatures
Files
-
e015fdb968376068124b847e47842ca3c00df17d19331b783b3aed1c0363ad8a.exe windows x86
511526f55eea6f0c633d7274b61f5269
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
CloseHandle
SetFileTime
GetSystemTimeAsFileTime
GetFileTime
GetLastError
CreateFileA
GetModuleFileNameA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcmpA
CreateDirectoryA
GetTempFileNameA
GetTempPathA
lstrcpynA
lstrcpyA
GetEnvironmentVariableA
SetFilePointer
InterlockedDecrement
FreeLibrary
FreeEnvironmentStringsA
UnhandledExceptionFilter
LoadLibraryA
GetProcAddress
lstrlenA
MultiByteToWideChar
WriteFile
DeleteCriticalSection
InitializeCriticalSection
LocalFree
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
RaiseException
GetVersionExA
GetLocaleInfoA
GetACP
lstrcmpiA
InterlockedExchange
GetStringTypeW
GetStdHandle
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
WideCharToMultiByte
LCMapStringA
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetEnvironmentStrings
advapi32
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
shell32
SHGetSpecialFolderPathA
wininet
InternetReadFile
shlwapi
StrStrA
PathAppendA
crypt32
CryptMsgClose
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CertCloseStore
CryptQueryObject
rpcrt4
UuidCreate
UuidCreateSequential
ole32
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
oleaut32
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ