Static task
static1
Behavioral task
behavioral1
Sample
e7c211af21ed3f459c3c56c011faf09354c0b03561cd3af8454a8c1756611233.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7c211af21ed3f459c3c56c011faf09354c0b03561cd3af8454a8c1756611233.exe
Resource
win10v2004-20220812-en
General
-
Target
e7c211af21ed3f459c3c56c011faf09354c0b03561cd3af8454a8c1756611233
-
Size
161KB
-
MD5
4061f37ebb36532f8ea0302cc52330a0
-
SHA1
24174e65abbe544244364130d71c62789e075372
-
SHA256
e7c211af21ed3f459c3c56c011faf09354c0b03561cd3af8454a8c1756611233
-
SHA512
d4c72553846069882fe9e5e6b7da00681cbd7963e226b536196fd1abf441e033fde4224be574a9ca7280d8279f99d9431d40170860dcd0da9ba27d13fc9d418f
-
SSDEEP
3072:r5vYk8icrgNSkWiYBlCPf/GFLfFtst0F5kHJsiX0s6wjqEPgQyTTo:ryMARFLAtJVkwqEPE
Malware Config
Signatures
Files
-
e7c211af21ed3f459c3c56c011faf09354c0b03561cd3af8454a8c1756611233.exe windows x86
2c0502e184a0c348a5554cdea7331fc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
GetACP
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessShutdownParameters
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetVersion
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
Heap32ListFirst
IsProcessorFeaturePresent
LoadLibraryA
LoadLibraryExA
LoadResource
FreeLibrary
LocalFileTimeToFileTime
LocalFree
LocalHandle
LockResource
MulDiv
ReadConsoleOutputAttribute
RemoveDirectoryA
ResetEvent
RtlUnwind
SetCurrentDirectoryA
SetEvent
SetFileApisToANSI
SetFilePointer
SetFileTime
SetProcessPriorityBoost
SetThreadPriority
SizeofResource
TerminateJobObject
TerminateThread
Toolhelp32ReadProcessMemory
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
_lclose
_lopen
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FormatMessageA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeleteTimerQueueEx
DeleteFileA
CreateThread
CreateProcessA
CreateEventA
CreateDirectoryA
LocalAlloc
AllocConsole
user32
GetWindowRect
LoadStringA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
GetDlgItemTextA
GetDlgItem
GetDesktopWindow
GetDC
ExitWindowsEx
EndDialog
EnableWindow
DispatchMessageA
DialogBoxIndirectParamA
CharUpperA
CharPrevA
CharNextA
CallWindowProcA
GetWindowLongA
gdi32
GetDeviceCaps
advapi32
RegQueryValueExA
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ