Static task
static1
Behavioral task
behavioral1
Sample
e6a48431497f4061b16d8795512a94a19f6b87341acdfaf6f5d77fd8eb064548.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6a48431497f4061b16d8795512a94a19f6b87341acdfaf6f5d77fd8eb064548.exe
Resource
win10v2004-20221111-en
General
-
Target
e6a48431497f4061b16d8795512a94a19f6b87341acdfaf6f5d77fd8eb064548
-
Size
135KB
-
MD5
b4b92ae2553f63b0b932b737432e3fda
-
SHA1
726406918f67ef8f47823a5c0648d4c1db688140
-
SHA256
e6a48431497f4061b16d8795512a94a19f6b87341acdfaf6f5d77fd8eb064548
-
SHA512
75e93e0f7e1adfdee305534a82b002744f5667e88eae48b843e0220a71c2f6c4d91f5555c30112e0b51d679a575b67a7c14da15f27f82974df5e3a8dec316aba
-
SSDEEP
3072:2bdjdaYbLIJMSDOBV5J0b0EPYJlyBq22LM9QS8TyBCYMO:2bdjdvIJE5J0b7PMyx2+A5
Malware Config
Signatures
Files
-
e6a48431497f4061b16d8795512a94a19f6b87341acdfaf6f5d77fd8eb064548.exe windows x86
3497d79f7018c6b99d65b01f799d02a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_unlock
__dllonexit
_lock
__set_app_type
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
calloc
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
lstrcpyA
GetModuleHandleA
GetProcAddress
IsDebuggerPresent
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.LvMfD Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ