Type
Static task
static1
Behavioral task
behavioral1
Sample
e44251a5fd9d2c11aca086a5967f61411dee54de78a9deb80014807465e29ffb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e44251a5fd9d2c11aca086a5967f61411dee54de78a9deb80014807465e29ffb.exe
Resource
win10v2004-20220901-en
General
-
Target
e44251a5fd9d2c11aca086a5967f61411dee54de78a9deb80014807465e29ffb
-
Size
499KB
-
MD5
73d9968eef29dd9d4ad8c76e279f96a0
-
SHA1
55dc712d1046dda7bb95dcab0a1748f251993bc2
-
SHA256
e44251a5fd9d2c11aca086a5967f61411dee54de78a9deb80014807465e29ffb
-
SHA512
c99d79149404f5b025d835ebcb2c6947fd0b374a9f56cdbe34335e293fb7c58884c35e8ada026f7e7118f70095c2e2ff4603b060f4ac06f8a7be767c24ac4bd2
-
SSDEEP
12288:TjGbP8ViV0jU1xfxZ6Y3g7Pf8BHuj+lAgv9Jk9l:/iV08fr3iPwHu0t9Jk9l
Malware Config
Signatures
Files
-
e44251a5fd9d2c11aca086a5967f61411dee54de78a9deb80014807465e29ffb.exe windows x86
2e466b055fb9c89587f0b34ac63ca9ac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
SetStdHandle
RtlUnwind
HeapFree
HeapQueryInformation
HeapSize
HeapReAlloc
MultiByteToWideChar
LoadLibraryW
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
IsValidCodePage
GetCPInfo
FlushFileBuffers
CreateFileW
CloseHandle
GetModuleHandleA
GetLastError
HeapCreate
Sleep
WriteFile
WaitForSingleObject
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
SetFilePointer
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapAlloc
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
GetModuleFileNameW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
RaiseException
user32
FindWindowA
SetClipboardData
SetWindowTextA
IsWindowVisible
GetSystemMetrics
OpenClipboard
DrawMenuBar
SetMenu
EndPaint
DestroyWindow
keybd_event
CloseClipboard
SetForegroundWindow
CopyImage
FindWindowExA
GetClientRect
SendMessageA
BeginPaint
GetDC
CreateWindowExA
EmptyClipboard
IsWindowUnicode
EnumChildWindows
ShowWindow
gdi32
SelectClipPath
GetStockObject
DeleteDC
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegCloseKey
RegOpenKeyW
RegQueryValueExW
ole32
OleInitialize
CoUnmarshalInterface
CreateStreamOnHGlobal
OleIsCurrentClipboard
netapi32
NetGetJoinInformation
NetApiBufferFree
iphlpapi
GetExtendedTcpTable
shlwapi
SHCreateStreamOnFileA
secur32
AddCredentialsA
uxtheme
OpenThemeData
CloseThemeData
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 291KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ