Static task
static1
Behavioral task
behavioral1
Sample
e5e7fc064bce6107c4a02647936823d336b4350cbfce8b4e89add6d07a0a9645.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5e7fc064bce6107c4a02647936823d336b4350cbfce8b4e89add6d07a0a9645.exe
Resource
win10v2004-20221111-en
General
-
Target
e5e7fc064bce6107c4a02647936823d336b4350cbfce8b4e89add6d07a0a9645
-
Size
220KB
-
MD5
09d4f51e1d676dd27ab6b8cea10c9a66
-
SHA1
383cf28ae2ee25abf6625e45f7bdd4460d2f43ab
-
SHA256
e5e7fc064bce6107c4a02647936823d336b4350cbfce8b4e89add6d07a0a9645
-
SHA512
cc9d058fb57abd2d32d8387d10ef55d9e20c70ab89fa214833dab9933236772bf3b23cc1619c350fcec23fca13c194d2c2a81f84ad07520b40031840f77a6b4c
-
SSDEEP
3072:g8ClGDhhuyQNCgz0AHVZYoM4GgDhl9Ft0vE1dyTF7ViP347R5AKy/6:olsuPCAi4DFd1EC9/
Malware Config
Signatures
Files
-
e5e7fc064bce6107c4a02647936823d336b4350cbfce8b4e89add6d07a0a9645.exe windows x86
e6a038f8e8859b7b56aa29ace36c6cef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
IsBadCodePtr
FormatMessageA
LocalFree
IsValidCodePage
GetShortPathNameA
GetProcAddress
FreeLibrary
GetEnvironmentVariableA
lstrlenA
GetStdHandle
lstrcpyA
CreateProcessA
GetConsoleCP
GetACP
GetConsoleOutputCP
GetOEMCP
GetModuleFileNameA
SetEnvironmentVariableA
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
VirtualQuery
GetSystemDirectoryA
GetWindowsDirectoryA
FlushFileBuffers
SetEndOfFile
SetFilePointer
IsDBCSLeadByte
IsBadReadPtr
GetSystemDefaultLangID
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
SetErrorMode
GetVersion
GetCurrentProcess
lstrcpynA
lstrcatA
lstrcmpiA
lstrcmpA
GetCurrentDirectoryA
GetVersionExA
GetLocaleInfoA
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
CloseHandle
GetFileType
CreateFileA
SetStdHandle
ReadFile
WriteFile
GetDriveTypeA
ExitProcess
TerminateProcess
RtlUnwind
RaiseException
GetFullPathNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapSize
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetCPInfo
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
CompareStringA
CompareStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
user32
LoadCursorA
SetCursor
CharToOemA
MessageBoxA
CharUpperA
CharLowerA
IsCharAlphaA
LoadStringA
LoadStringW
CharNextA
IsCharAlphaNumericA
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
q�'C� Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE