Static task
static1
Behavioral task
behavioral1
Sample
e6c28a226f207389f32d41bacf1ba05a6e8d4c0507325d1e80bd778df9a684df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6c28a226f207389f32d41bacf1ba05a6e8d4c0507325d1e80bd778df9a684df.exe
Resource
win10v2004-20220812-en
General
-
Target
e6c28a226f207389f32d41bacf1ba05a6e8d4c0507325d1e80bd778df9a684df
-
Size
505KB
-
MD5
457ce0dfb00d6227f6431cc73de50985
-
SHA1
321086aeffe2a1752c747e598814d37a645917de
-
SHA256
e6c28a226f207389f32d41bacf1ba05a6e8d4c0507325d1e80bd778df9a684df
-
SHA512
e6e666687759e31b132492066f42bf05e550ecead4dd1f4cc2bc27099c7beb9e4f36cdb040720d15d0acee788a81da55a40382a4bb9dbc2578987960fc143aed
-
SSDEEP
12288:ASWpm6rJvXeSRzO8v0DBpJcAivFS5Fwxwy4Ntc3CfUzGrE0u4:AS0eSRzOhDB/5KwXNtcK1gn
Malware Config
Signatures
Files
-
e6c28a226f207389f32d41bacf1ba05a6e8d4c0507325d1e80bd778df9a684df.exe windows x86
5de831a37e135a0287991022e5b51e4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteExW
RealShellExecuteW
comctl32
ImageList_SetOverlayImage
InitCommonControlsEx
user32
MessageBoxA
RegisterClassA
CreateWindowExA
ShowWindow
DdeAddData
RegisterClassExA
kernel32
EnumCalendarInfoA
GetCurrentProcess
CompareStringW
CreateMutexA
VirtualProtect
RemoveDirectoryW
LCMapStringW
GetStringTypeW
VirtualFree
SetEnvironmentVariableA
TlsSetValue
GetLocaleInfoW
GetOEMCP
WaitNamedPipeA
LoadLibraryA
UnhandledExceptionFilter
GetLastError
RtlUnwind
GetStdHandle
GetProfileStringA
HeapSize
GetACP
TlsGetValue
GetModuleFileNameA
GetTimeZoneInformation
HeapAlloc
GetCommandLineA
CloseHandle
HeapFree
FormatMessageA
LeaveCriticalSection
GetModuleFileNameW
ExitProcess
GetUserDefaultLCID
SetStdHandle
TerminateProcess
GetDateFormatA
CreateDirectoryExW
lstrcmpi
IsBadWritePtr
GetVersionExA
SetLastError
EnterCriticalSection
UnlockFileEx
GetStartupInfoW
MultiByteToWideChar
VirtualUnlock
GetCPInfo
HeapLock
RtlFillMemory
OpenMutexA
GetTimeFormatA
ReadFile
WideCharToMultiByte
HeapCreate
GetStartupInfoA
HeapReAlloc
IsValidLocale
GetNamedPipeHandleStateA
GetConsoleCP
VirtualAlloc
ReadConsoleOutputA
LCMapStringA
GetTickCount
TlsFree
GetLocaleInfoA
FreeEnvironmentStringsA
GetCommandLineW
IsValidCodePage
FreeEnvironmentStringsW
GetProcAddress
CompareStringA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
TlsAlloc
GetCurrentProcessId
GetStringTypeA
GetEnvironmentStrings
HeapDestroy
GetModuleHandleA
InitializeCriticalSection
FlushFileBuffers
GetCurrentThreadId
VirtualQuery
ExpandEnvironmentStringsW
GetSystemInfo
SetHandleCount
SetFilePointer
EnumSystemLocalesA
DeleteCriticalSection
InterlockedExchange
WriteFile
GetCurrentThread
Sections
.text Size: 297KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ