Static task
static1
Behavioral task
behavioral1
Sample
e454f05739b9742e902d3cf9e053c7ce1ecbff1632eb3134193dd343ee0423d8.exe
Resource
win10-20220812-en
General
-
Target
e454f05739b9742e902d3cf9e053c7ce1ecbff1632eb3134193dd343ee0423d8
-
Size
280KB
-
MD5
2e2e801bd6ab3e7fed807bb3a1c2bf2f
-
SHA1
b0f730a7bbdba75bd2ce0ece7b0d5d60064a7608
-
SHA256
e454f05739b9742e902d3cf9e053c7ce1ecbff1632eb3134193dd343ee0423d8
-
SHA512
8985c1347d6956fa3033a50b2d2d207dd27f00119037e66844b306d1c5cfa50973ec24745f1b952fcf1b7c8f3b19abab0234d71145cf0a37f0eddcade9fa6b9f
-
SSDEEP
6144:Ws67w8qRLhh923P6KQEU0uSnjh9nEmQLr:5Cw8qRX92/NQF1SnPE7
Malware Config
Signatures
Files
-
e454f05739b9742e902d3cf9e053c7ce1ecbff1632eb3134193dd343ee0423d8.exe windows x86
9b1a200c894929ce96d61dcad12096ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ContinueDebugEvent
LCMapStringW
GetProcAddress
LocalAlloc
GetBinaryTypeW
SearchPathA
VerifyVersionInfoA
ExpandEnvironmentStringsW
EndUpdateResourceA
FindNextFileW
FindFirstVolumeW
LocalFlags
GlobalFlags
CopyFileW
CreateActCtxW
lstrlenW
UpdateResourceW
CreateActCtxA
DeleteVolumeMountPointW
InterlockedExchangeAdd
GetCurrentDirectoryW
CreateMutexW
DeactivateActCtx
MoveFileA
GetLogicalDriveStringsA
ResetEvent
InterlockedPushEntrySList
CreateMailslotA
WriteConsoleInputA
QueryDosDeviceA
GetTempPathW
InterlockedDecrement
EnumTimeFormatsW
SetFileValidData
FindFirstFileA
FreeEnvironmentStringsW
LocalReAlloc
GetTickCount
SetLastError
GetPrivateProfileStructA
CopyFileExA
GetTempPathA
ReadConsoleInputA
CreateDirectoryExA
GetConsoleAliasA
MoveFileWithProgressA
LoadLibraryA
GetLastError
WideCharToMultiByte
DeleteFileA
GetStartupInfoW
GetModuleHandleA
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
HeapFree
CloseHandle
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ReadFile
HeapSize
CreateFileA
gdi32
GetCharWidth32A
GetCharABCWidthsA
SelectObject
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpSetCredentials
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 39.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ