Static task
static1
Behavioral task
behavioral1
Sample
e68858e402baa14a48e543de8cbdf0f8fb6a3b5a435e8834e9a3fe3c95af85b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e68858e402baa14a48e543de8cbdf0f8fb6a3b5a435e8834e9a3fe3c95af85b8.exe
Resource
win10v2004-20220812-en
General
-
Target
e68858e402baa14a48e543de8cbdf0f8fb6a3b5a435e8834e9a3fe3c95af85b8
-
Size
574KB
-
MD5
4975caa83d0df0a1c30e1e33e9405020
-
SHA1
0accc81295c20ff9d718d9a12d7783098d1f5fb3
-
SHA256
e68858e402baa14a48e543de8cbdf0f8fb6a3b5a435e8834e9a3fe3c95af85b8
-
SHA512
a84501b3316b0a02a76da492b982a2baca48e3f82034d0f38c213e4f5ae9666332bc8c295ad9e6aff5adffab4cd159792b7e1fb90453ac0ed9e0262f5a60ad6a
-
SSDEEP
12288:gdMZIO8vx6tN8d5OAH/nOZqAzInqUtenW6DZCTz3:gdMuO8vxuNM5OAHGZTzMFsZS
Malware Config
Signatures
Files
-
e68858e402baa14a48e543de8cbdf0f8fb6a3b5a435e8834e9a3fe3c95af85b8.exe windows x86
a533d963ee83c56f5b1a07e3d740f95e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
DeviceIoControl
HeapCreate
HeapDestroy
ExpandEnvironmentStringsW
OutputDebugStringA
IsDebuggerPresent
FlushFileBuffers
MultiByteToWideChar
EncodePointer
DecodePointer
IsWow64Process
HeapSize
LocalFree
GetLastError
GetCommandLineW
Sleep
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetTempFileNameW
HeapReAlloc
GetFileSize
TlsGetValue
MapViewOfFile
UnmapViewOfFile
VirtualQuery
HeapAlloc
HeapFree
GetProcessHeap
GetWindowsDirectoryA
InitializeCriticalSection
TlsSetValue
FormatMessageW
LeaveCriticalSection
GetFileAttributesW
GetTempPathW
RaiseException
SetLastError
EnterCriticalSection
GetLocalTime
CreateFileMappingW
DeleteCriticalSection
TlsAlloc
GetWindowsDirectoryW
TlsFree
CloseHandle
CreateFileA
CreateMutexW
SetFilePointer
WaitForSingleObject
GetModuleHandleW
GetCurrentThread
ExpandEnvironmentStringsA
WriteFile
GetModuleFileNameW
CreateFileW
GetProcAddress
LoadLibraryA
CreateFileMappingA
GetSystemInfo
GetModuleFileNameA
CreateMutexA
ReleaseMutex
GetVersion
DeleteFileW
DebugBreak
DeleteFileA
GetFileSizeEx
WideCharToMultiByte
msvcrt
_vsnwprintf
_vsnprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_purecall
_wcsnicmp
iswctype
feof
_wtoi
_wfopen
fgetws
swscanf_s
wcsrchr
_cexit
towlower
free
malloc
??1type_info@@UAE@XZ
__p__fmode
wcstok_s
_exit
_ismbblead
__setusermatherr
_initterm
_acmdln
__CxxFrameHandler3
?terminate@@YAXXZ
_controlfp
_except_handler4_common
_lock
_unlock
__dllonexit
_onexit
fclose
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
_wcsicmp
memset
memcpy
shell32
CommandLineToArgvW
ord165
advapi32
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EqualSid
GetTokenInformation
OpenThreadToken
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetLengthSid
dbghelp
MiniDumpWriteDump
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
ole32
CoUninitialize
CoInitializeEx
propsys
PSRegisterPropertySchema
PSUnregisterPropertySchema
user32
UnregisterClassA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 504KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE