Static task
static1
Behavioral task
behavioral1
Sample
e02a243ecea4f3d6c1839f7f681db96ae701f562b4f2eced0a0ba4818c231545.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e02a243ecea4f3d6c1839f7f681db96ae701f562b4f2eced0a0ba4818c231545.exe
Resource
win10v2004-20220812-en
General
-
Target
e02a243ecea4f3d6c1839f7f681db96ae701f562b4f2eced0a0ba4818c231545
-
Size
268KB
-
MD5
6f1afb1fa70531f3cf78a162f0f1b8e9
-
SHA1
af1598761729b0d91fbf1fd67f3ab7ac5df96724
-
SHA256
e02a243ecea4f3d6c1839f7f681db96ae701f562b4f2eced0a0ba4818c231545
-
SHA512
c2a8ce1a9c5637cc4df56758d0bcdbd8d7f6f32c85995abb756dc88277a78f1fb0a3fd34e82a059061c2acce653aa3c207bcbde332ed78cf11f4c23fa1e96441
-
SSDEEP
6144:LeZbXEVBpXBGLGR4EtbN/BuYTMiT/TU6U3:E0oEXw2T/TU6U3
Malware Config
Signatures
Files
-
e02a243ecea4f3d6c1839f7f681db96ae701f562b4f2eced0a0ba4818c231545.exe windows x86
5721b691c907c91d1940e16dd85a076e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteFileA
GetCurrentDirectoryA
GetModuleHandleA
GetFileSize
WaitForSingleObject
SetLastError
CreateFileA
CreateMutexW
GetCalendarInfoA
HeapCreate
GetTickCount
HeapSize
GetTickCount
CloseHandle
GetEnvironmentVariableA
HeapDestroy
Sleep
ResetEvent
ExitProcess
GetStartupInfoW
ReleaseMutex
FindClose
GetProfileIntW
SuspendThread
user32
CallWindowProcW
DispatchMessageW
GetSysColor
GetDC
GetClassInfoA
DispatchMessageW
MessageBoxA
GetCursorPos
GetDC
GetWindowLongA
PeekMessageA
GetDC
GetDC
dmintf
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ