Static task
static1
Behavioral task
behavioral1
Sample
e9532b458002449480f916e05443dc1b15ebaaba20fd4ee6d869157fe00ce754.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9532b458002449480f916e05443dc1b15ebaaba20fd4ee6d869157fe00ce754.exe
Resource
win10v2004-20220812-en
General
-
Target
e9532b458002449480f916e05443dc1b15ebaaba20fd4ee6d869157fe00ce754
-
Size
4KB
-
MD5
8fc392fdb4a9f098de8eed0cb8b6da8d
-
SHA1
4c08b47cf5e13f1744a9f4219478710d73afae0c
-
SHA256
e9532b458002449480f916e05443dc1b15ebaaba20fd4ee6d869157fe00ce754
-
SHA512
aa005a6029c483cf4472f5ac6dc955b44b4056e94c872a27f17a79e16b55ffd0cbc89ecc72e819aa4c7267b9002cf6bd85f846f45cb9bc81a018601e3f2eed7c
-
SSDEEP
96:o/IoGri/k/iirNVTkhUvHoTIxX7bDMrtU77aRSi1m/X+KsnGjA:AMrdiukGXfDMhULioXxzjA
Malware Config
Signatures
Files
-
e9532b458002449480f916e05443dc1b15ebaaba20fd4ee6d869157fe00ce754.exe windows x86
fef317c1635d84a39c1bc40236454b57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetProcAddress
LoadLibraryA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
FreeLibrary
FlushViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
CloseHandle
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
OpenProcess
WinExec
GetWindowsDirectoryA
GetFileAttributesA
GetSystemDirectoryA
UnmapViewOfFile
ExitProcess
user32
GetWindowThreadProcessId
FindWindowA
imagehlp
CheckSumMappedFile
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ