Static task
static1
Behavioral task
behavioral1
Sample
e1030d368682c1ac5cba8ab4ae55955030c551f25bac11d54d79062d711cd2c9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1030d368682c1ac5cba8ab4ae55955030c551f25bac11d54d79062d711cd2c9.exe
Resource
win10v2004-20221111-en
General
-
Target
e1030d368682c1ac5cba8ab4ae55955030c551f25bac11d54d79062d711cd2c9
-
Size
85KB
-
MD5
05af778a41ea9d1d30c99ac7910b4100
-
SHA1
8ce2c151b0a6a76faeb101e33c246db43f01acaa
-
SHA256
e1030d368682c1ac5cba8ab4ae55955030c551f25bac11d54d79062d711cd2c9
-
SHA512
8e4dc2164a0e3c6f0f5b83aa4b533581dbe58fdf1b17985447fd21ce23f108b7fa5d6937709b1857852eb2404af74399297e4e5219afad32aaabd141631ec382
-
SSDEEP
1536:haBgOQO0lVhwaTFzKt8z9DqQaKxQVFhWY2fARos0Az:0BgF5VaaJzBTxxQVfWYC70
Malware Config
Signatures
Files
-
e1030d368682c1ac5cba8ab4ae55955030c551f25bac11d54d79062d711cd2c9.exe windows x86
c781fee07c32013391d969b22afa54ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FindFirstFileA
VirtualFree
HeapAlloc
CreateThread
LoadLibraryExA
LockResource
GetProcAddress
GetCurrentThreadId
EnterCriticalSection
Sleep
GetCurrentThread
GlobalDeleteAtom
GetModuleHandleA
GetVersionExA
GetCommandLineA
lstrcatA
lstrcpyA
GetStringTypeW
FindClose
GetFileAttributesA
GetLocaleInfoA
FindResourceA
GetFileType
lstrcpynA
GetModuleFileNameA
ExitThread
InitializeCriticalSection
lstrcmpA
GetDiskFreeSpaceA
MoveFileA
SetFilePointer
DeleteCriticalSection
GetSystemDefaultLangID
GetACP
FreeResource
GetOEMCP
GetUserDefaultLCID
lstrcmpiA
GetStartupInfoA
GetThreadLocale
MoveFileExA
SetErrorMode
WriteFile
GetStringTypeA
SetHandleCount
GetFileSize
VirtualQuery
DeleteFileA
GetTickCount
lstrlenA
WideCharToMultiByte
CreateEventA
MulDiv
GlobalAlloc
GetLastError
SetLastError
FormatMessageA
LoadLibraryA
LoadResource
ResetEvent
GetDateFormatA
SetThreadLocale
ExitProcess
LocalFree
LocalReAlloc
SetEvent
GlobalAddAtomA
GlobalFindAtomA
GetFullPathNameA
GetVersion
HeapDestroy
GetLocalTime
GetEnvironmentStrings
GetCurrentProcess
CompareStringA
EnumCalendarInfoA
GetProcessHeap
FreeLibrary
RaiseException
WaitForSingleObject
ReadFile
GetCurrentProcessId
GetStdHandle
VirtualAlloc
Sections
CODE Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 63KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 959B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ