Static task
static1
Behavioral task
behavioral1
Sample
e003ffb1cd091451fdaad32c4bebb662748e93adbd47965460a95a0e7680cd7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e003ffb1cd091451fdaad32c4bebb662748e93adbd47965460a95a0e7680cd7d.exe
Resource
win10v2004-20221111-en
General
-
Target
e003ffb1cd091451fdaad32c4bebb662748e93adbd47965460a95a0e7680cd7d
-
Size
38KB
-
MD5
0b4e00b52c0a646fb18310a75a2e4c9f
-
SHA1
290b5f444f945502ac8db2917213b9541536dba1
-
SHA256
e003ffb1cd091451fdaad32c4bebb662748e93adbd47965460a95a0e7680cd7d
-
SHA512
e9603b08ba1351a454eba1e632384bdea1c1cfcef9f0c20de7f9edd91a1935ccf8787402f2f8a43d4feeb05bc9a96e8e55851581ac2b19739c21470888ec2d2b
-
SSDEEP
768:wQh5V+cdPKY0BAHgDYNX3+OZJpDN3EsrnXrXXX15XXXfXMr:wQjAcdqWLUCPESnXrXXX15XXXfXMr
Malware Config
Signatures
Files
-
e003ffb1cd091451fdaad32c4bebb662748e93adbd47965460a95a0e7680cd7d.exe windows x86
7828d59efe9e84a1fc639c916a1e091e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
CheckSumMappedFile
kernel32
GetCurrentProcessId
VirtualFree
GetTempPathA
CloseHandle
WriteFile
CreateFileA
VirtualAlloc
ExitProcess
LoadLibraryA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
Sleep
QueryPerformanceCounter
ReadFile
SetFilePointer
GetProcAddress
FreeLibrary
GetVersion
advapi32
RegCreateKeyW
RegSetValueExA
RegDeleteKeyA
RegSetValueExW
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 162B - Virtual size: 310B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ