?COMWndProc@@YGJPAUHWND__@@IIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
e2e2bd4590380377cbc94e86e5ff64f0d7734759ca00f675c1098124d910c16a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2e2bd4590380377cbc94e86e5ff64f0d7734759ca00f675c1098124d910c16a.exe
Resource
win10v2004-20220812-en
General
-
Target
e2e2bd4590380377cbc94e86e5ff64f0d7734759ca00f675c1098124d910c16a
-
Size
160KB
-
MD5
54ec8d77e8ec874d4e8a43f438b2c950
-
SHA1
351c98829c2bce8ab45c3e8b2302eff281e14810
-
SHA256
e2e2bd4590380377cbc94e86e5ff64f0d7734759ca00f675c1098124d910c16a
-
SHA512
76b5d834aef841b82c791f1468a55ca07f3559de6664650bdf0528810fa336bafb05153c922e667b5881c26a50bbb8f8560e7275194270ee875ea81c7ec56361
-
SSDEEP
3072:WGV8OJYcbXQH/3q+LCl83PZi/ALZxceV/YEVmBw5A9RlVt:WaR0/dwqPZi/ALZxcc/YEVaYWRXt
Malware Config
Signatures
Files
-
e2e2bd4590380377cbc94e86e5ff64f0d7734759ca00f675c1098124d910c16a.exe windows x86
4640efbe8b7842df98185aba3d9b8ed9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalFree
LocalAlloc
CreateFileA
LoadLibraryA
SetErrorMode
GetProcAddress
GetStartupInfoA
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
lstrcpyA
CloseHandle
lstrlenA
lstrlenW
WideCharToMultiByte
CreateFileMappingA
MapViewOfFile
GetLastError
UnmapViewOfFile
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
user32
SetForegroundWindow
MessageBoxA
SendMessageA
EnableWindow
LoadIconA
GetParent
GetWindowLongA
DefWindowProcA
IsWindow
GetWindowRect
LoadBitmapA
CharUpperA
RedrawWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
msvcrt
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
__set_app_type
toupper
_chdrive
_chdir
_getcwd
_except_handler3
_mbsicmp
_mbscmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_setmbcp
_controlfp
mfc42
ord2414
ord3663
ord3626
ord771
ord795
ord4431
ord2054
ord4439
ord5288
ord2528
ord1690
ord3571
ord3721
ord1908
ord4234
ord4853
ord3873
ord4275
ord2379
ord3874
ord4123
ord2825
ord4259
ord1008
ord1641
ord2116
ord6880
ord4299
ord4715
ord2646
ord497
ord1133
ord2614
ord2642
ord5981
ord2817
ord858
ord539
ord537
ord861
ord913
ord4189
ord1601
ord6334
ord924
ord922
ord6905
ord3438
ord5593
ord3998
ord912
ord3301
ord4188
ord6907
ord6453
ord3439
ord5632
ord4710
ord6199
ord3092
ord384
ord2096
ord1146
ord2862
ord3996
ord4258
ord2364
ord2370
ord2302
ord489
ord397
ord567
ord398
ord860
ord768
ord699
ord609
ord693
ord700
ord3574
ord4627
ord3402
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord815
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord800
ord2109
ord939
ord941
ord4160
ord540
ord6215
ord2864
ord1168
ord2621
ord2725
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord5265
ord4377
ord4854
ord4998
ord2514
ord6052
ord1775
ord4407
ord5287
ord4835
ord4425
ord3699
ord2582
ord4402
ord3370
ord3640
ord2575
ord6055
ord4078
ord1776
ord4396
ord5241
ord2385
ord5163
ord6374
ord4353
ord5290
ord3798
ord1576
comctl32
ImageList_ReplaceIcon
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE