Static task
static1
Behavioral task
behavioral1
Sample
edc9ed693e0623d7bb3d1edffd5e3d750ee38afd65ade6b330d0f551f9a1a44c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edc9ed693e0623d7bb3d1edffd5e3d750ee38afd65ade6b330d0f551f9a1a44c.exe
Resource
win10v2004-20221111-en
General
-
Target
edc9ed693e0623d7bb3d1edffd5e3d750ee38afd65ade6b330d0f551f9a1a44c
-
Size
92KB
-
MD5
e4e737d74cbd57d2774d5e38c44c156b
-
SHA1
1a6f680f3a591514393c05435741b662cc3ea103
-
SHA256
edc9ed693e0623d7bb3d1edffd5e3d750ee38afd65ade6b330d0f551f9a1a44c
-
SHA512
687fced81ba12386d3ea294dd0c3a20f3dfa1cd2b77b2a30934011078f8571732083af9f06ebb21478ff3c07883b56cc4715206a7dff47cad47b6d5503e05d83
-
SSDEEP
1536:Z8K7tX93Bz++rQtwsBnIc3oxs2xOwW7Xl+FKXRGJkU0S9lpAr:nnVkvUw1ZhGJ9t9lp
Malware Config
Signatures
Files
-
edc9ed693e0623d7bb3d1edffd5e3d750ee38afd65ade6b330d0f551f9a1a44c.exe windows x86
86d6c93ef34b6bdef2f6c1a522369a81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
Sleep
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
Process32First
Module32First
Module32Next
GetTempPathA
Process32Next
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
ExitProcess
HeapFree
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
LCMapStringW
GetCPInfo
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
WriteFile
FlushFileBuffers
SetFilePointer
CloseHandle
ReadFile
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
CreateFileA
GetLocaleInfoW
user32
wsprintfA
advapi32
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ