Static task
static1
Behavioral task
behavioral1
Sample
e1c3b82c02040ff0ce0fb28d318fb2a57a986ad2c4c45ad8405af89e7c1052c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1c3b82c02040ff0ce0fb28d318fb2a57a986ad2c4c45ad8405af89e7c1052c9.exe
Resource
win10v2004-20221111-en
General
-
Target
e1c3b82c02040ff0ce0fb28d318fb2a57a986ad2c4c45ad8405af89e7c1052c9
-
Size
37KB
-
MD5
92ed462dec5d8901bd21402fdaf28f4d
-
SHA1
000f5ef621593f2ff27f95e70315fd0d1c6717a0
-
SHA256
e1c3b82c02040ff0ce0fb28d318fb2a57a986ad2c4c45ad8405af89e7c1052c9
-
SHA512
341a120c8051c42afc1ded6317bab3a39096a42074313019d1406f100cfbb051353765bc6e352dc4f78b0f83b764aea97ebe0c29f19ea2085a2416622f4ec6f2
-
SSDEEP
768:GdfjjT6g4FlSeYUDc/xokGNtRP9fFITepRJthGCJ9GYAfE:eLjTONcHGNLP9fVpRJthGQ9h
Malware Config
Signatures
Files
-
e1c3b82c02040ff0ce0fb28d318fb2a57a986ad2c4c45ad8405af89e7c1052c9.exe windows x86
a365388757042068c39f6c0d283bc7a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateFileW
CreateProcessA
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
GetFileTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetShortPathNameA
GetStartupInfoA
GetTempPathW
GetVersion
GlobalAlloc
GlobalFree
MoveFileA
MoveFileExA
ReadFile
RtlMoveMemory
SetFilePointer
SetFileTime
WaitForSingleObject
WinExec
WriteFile
lstrcatA
lstrcatW
lstrlenA
lstrlenW
user32
CreateDesktopA
EnumWindows
FindWindowA
GetMessageA
MenuItemFromPoint
PostQuitMessage
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
comctl32
MenuHelp
shell32
ShellExecuteA
ShellExecuteW
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE