Static task
static1
Behavioral task
behavioral1
Sample
e0c38e7f5a4d4743a6f680038dd6a4dc0fcbb38cd89a784532aa4badb5033e67.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0c38e7f5a4d4743a6f680038dd6a4dc0fcbb38cd89a784532aa4badb5033e67.exe
Resource
win10v2004-20221111-en
General
-
Target
e0c38e7f5a4d4743a6f680038dd6a4dc0fcbb38cd89a784532aa4badb5033e67
-
Size
165KB
-
MD5
3507ccdb4c334d8ed09a1c3662a18662
-
SHA1
7a1525ff8b577886378c261639b9390bd820b2ae
-
SHA256
e0c38e7f5a4d4743a6f680038dd6a4dc0fcbb38cd89a784532aa4badb5033e67
-
SHA512
12023a68b03604d2ca94417a6f3cce167ec10257519a18dea4423b21f11290cbb78443bfe5158fc1aae95eead6d1a35b633cd7c7af119795222bdc7813848627
-
SSDEEP
3072:5H1IRNqjWUlWgAG9qa4u0oYLqFowMmzXju44pgr8ueDmi:n4NEWgdUa4uYLqFowMmzK40gr89i
Malware Config
Signatures
Files
-
e0c38e7f5a4d4743a6f680038dd6a4dc0fcbb38cd89a784532aa4badb5033e67.exe windows x86
653ef7b1fb8f2af7681ae3b3b5ec9769
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
HeapAlloc
ExitProcess
IsBadReadPtr
SetUnhandledExceptionFilter
RtlUnwind
HeapAlloc
GetProcessHeap
RaiseException
EnumResourceTypesW
HeapValidate
FindFirstFileExW
GetSystemInfo
VirtualProtect
VirtualAlloc
QueryPerformanceCounter
HeapFree
oleacc
GetOleaccVersionInfo
CreateStdAccessibleObject
gdi32
GetStockObject
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ