Static task
static1
Behavioral task
behavioral1
Sample
e5129513f0fcb1948d96cd38506b810301da32236e274b945e2848cf87923bd3.exe
Resource
win10-20230220-en
General
-
Target
e5129513f0fcb1948d96cd38506b810301da32236e274b945e2848cf87923bd3
-
Size
350KB
-
MD5
7e5caff1591c9dd23cc6c35cc3e05907
-
SHA1
c9538dec86f8cdcabda6471b9879d4b13741c401
-
SHA256
e5129513f0fcb1948d96cd38506b810301da32236e274b945e2848cf87923bd3
-
SHA512
f4eac7694be7a8a55dbb0fdb4dc9c319ae9667d876b89ad1c72ad7f00568b58b058db7b32347276efac68e28da72cb1a96fb4c0b837918397edf4fcbe12812d8
-
SSDEEP
3072:0Q+azEbG8er/B/8crPuzw5+H/xyVcLG5ZGet2Ebp30ou0nT76jBMVDGzqkV46kgI:lbg0r/zpmJkvtt9i0nT76tMVDG2Zglc
Malware Config
Signatures
Files
-
e5129513f0fcb1948d96cd38506b810301da32236e274b945e2848cf87923bd3.exe windows x86
180182f511c2c9a851c98bfb224641e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetUnhandledExceptionFilter
GetConsoleAliasA
GetCurrentProcess
GetNamedPipeHandleStateA
GetModuleHandleExW
GetUserDefaultLCID
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
FreeEnvironmentStringsA
SetTapeParameters
GetModuleHandleW
CreateRemoteThread
WaitNamedPipeW
AllocateUserPhysicalPages
GetEnvironmentStrings
GlobalAlloc
GlobalFindAtomA
GetConsoleMode
GetVersionExW
GetFileAttributesA
GetComputerNameExA
FindNextVolumeW
GetModuleFileNameW
lstrcmpW
MultiByteToWideChar
GetStringTypeA
FindNextVolumeMountPointW
GetConsoleOutputCP
GetLastError
BackupRead
GetProcAddress
RemoveDirectoryA
GlobalGetAtomNameA
LoadLibraryA
OpenMutexA
SetCalendarInfoW
DnsHostnameToComputerNameA
SetCommMask
RtlCaptureStackBackTrace
GetPrivateProfileStructA
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
EraseTape
CreateMutexA
CreateMailslotA
RequestWakeupLatency
ScrollConsoleScreenBufferA
GetDiskFreeSpaceExA
DeleteFileW
GetFileInformationByHandle
FindActCtxSectionStringW
EnumSystemLocalesW
CreateFileW
WriteConsoleW
GetVolumePathNameA
EnumCalendarInfoA
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
DeleteFileA
HeapReAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
GetLocaleInfoW
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
CloseHandle
user32
GetMenu
advapi32
ReportEventA
winhttp
WinHttpSetOption
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ