Static task
static1
Behavioral task
behavioral1
Sample
e3466688c5674346c6dd2f9cfde369f39ea6f9a3fb019b7d76e19883c70b08f1.exe
Resource
win7-20220901-en
General
-
Target
e3466688c5674346c6dd2f9cfde369f39ea6f9a3fb019b7d76e19883c70b08f1
-
Size
167KB
-
MD5
6f4540d138f281b29415b9cbafa62910
-
SHA1
c54f00eca7b1f5a772f58b2220fe8199da4019f8
-
SHA256
e3466688c5674346c6dd2f9cfde369f39ea6f9a3fb019b7d76e19883c70b08f1
-
SHA512
b11da1f3c1e8555ccf64082ebdc1cce491b5e3f125d7a7b5448246831fb1e9532c723a475880d4fe07fc80ecff93b6bc11578b2f6de6abb95f8cb7876d9e46e0
-
SSDEEP
3072:RR6j9TQO+YkGZZin+HqZhWePiFkR/OYnlZFb:2x8skfPf
Malware Config
Signatures
Files
-
e3466688c5674346c6dd2f9cfde369f39ea6f9a3fb019b7d76e19883c70b08f1.exe windows x86
06c8ef129234423c27b8b57c4334e026
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
MultiByteToWideChar
SetCurrentDirectoryA
GetProcessHeap
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
VirtualAlloc
GetProcAddress
GetLastError
GetCurrentThread
GetCommandLineW
GetCommandLineA
FreeLibrary
ExitProcess
CreateMutexA
CompareStringA
SetErrorMode
CloseHandle
user32
LoadCursorA
LoadIconW
LoadIconA
ShowWindow
SetForegroundWindow
SendMessageTimeoutA
MessageBoxA
IsWindowVisible
IsIconic
GetWindowThreadProcessId
GetWindow
GetParent
GetClassNameA
FindWindowA
GetDesktopWindow
advapi32
GetAce
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
SetSecurityInfo
RegOpenKeyA
RegCloseKey
GetSecurityInfo
RegNotifyChangeKeyValue
shell32
Shell_NotifyIconW
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ