Static task
static1
Behavioral task
behavioral1
Sample
ee1ca37327f145b52eb5003191ebc06749b04ebd4be3b0e1147f1e33934a1d3b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee1ca37327f145b52eb5003191ebc06749b04ebd4be3b0e1147f1e33934a1d3b.exe
Resource
win10v2004-20220812-en
General
-
Target
ee1ca37327f145b52eb5003191ebc06749b04ebd4be3b0e1147f1e33934a1d3b
-
Size
66KB
-
MD5
f8ca39e29bd892afca5db05c331b09f8
-
SHA1
6bca683fa279a43c660de4e83d61f59ff17bbb26
-
SHA256
ee1ca37327f145b52eb5003191ebc06749b04ebd4be3b0e1147f1e33934a1d3b
-
SHA512
e5df5054d03609fd8ec274c374f057fed6a4086f6957b39a735af631d0b9afd5342ea10c152f57ea240b8fb8ce6070f953f583f49c9d15547e5660a08cb099c6
-
SSDEEP
1536:qkolqn6eMPE1U340QtxdpBuRAGIEu/w/34GQ7lz:z767kzM6GSwfrslz
Malware Config
Signatures
Files
-
ee1ca37327f145b52eb5003191ebc06749b04ebd4be3b0e1147f1e33934a1d3b.exe windows x86
11a8fd4e7d158a2e8273c18240ec3ad6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
CreateFileA
GetModuleFileNameA
ReadFile
GetModuleHandleA
OpenProcess
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 824B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE