Static task
static1
Behavioral task
behavioral1
Sample
e8151d54bbd9848396540641fb62c0a972deb00b8507c93539cb20055f2e4715.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8151d54bbd9848396540641fb62c0a972deb00b8507c93539cb20055f2e4715.exe
Resource
win10v2004-20220812-en
General
-
Target
e8151d54bbd9848396540641fb62c0a972deb00b8507c93539cb20055f2e4715
-
Size
102KB
-
MD5
6a19487bd7b30916c11cb41828759816
-
SHA1
c050badfe9cda673034022876a29390c8ad0f202
-
SHA256
e8151d54bbd9848396540641fb62c0a972deb00b8507c93539cb20055f2e4715
-
SHA512
aa4f73a124e6651cf443a606cc3cdd48b5b6a153c3213ef3d9ba760cacaab81bb389fb4569f74a7af288de132f302234ebd01f47e896f8b1671d61153205ff61
-
SSDEEP
3072:iykgwilHSlGI0ja1k5DtFZ/BmcNv2ywddv4J:iyDwicgI0jSWzFBmcNvqAJ
Malware Config
Signatures
Files
-
e8151d54bbd9848396540641fb62c0a972deb00b8507c93539cb20055f2e4715.exe windows x86
12c5cb558e2eb10a538b110236f2a22a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DosDateTimeToFileTime
GetCurrentThreadId
OpenProcess
EnumResourceNamesA
ReadProcessMemory
FindCloseChangeNotification
GlobalGetAtomNameA
GetPrivateProfileIntA
CreateToolhelp32Snapshot
GetHandleInformation
FindFirstFileA
GetModuleHandleA
GetTempFileNameW
CopyFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentProcess
GetSystemWindowsDirectoryA
GetFileType
Process32Next
FoldStringW
GetModuleFileNameW
InterlockedExchangeAdd
LocalHandle
LocalFileTimeToFileTime
CloseHandle
EnumResourceLanguagesA
CreateEventW
LoadModule
ExitProcess
GetModuleFileNameA
GetVersion
GetProcAddress
WriteProcessMemory
FindResourceExW
GetFullPathNameA
GetCommState
EnumSystemLocalesA
FindResourceA
Process32First
GetDateFormatW
GetThreadContext
FindFirstVolumeW
DeleteFiber
LoadLibraryA
user32
InflateRect
GetKeyNameTextA
GetMessageA
DefWindowProcA
GetKeyState
RegisterClassExA
EnumClipboardFormats
GetFocus
GetClassInfoA
ShowWindow
EndDeferWindowPos
GetDesktopWindow
CharNextA
ChildWindowFromPoint
InSendMessage
CreateWindowExA
GetMessageW
DrawAnimatedRects
UpdateWindow
DispatchMessageA
GetWindowRect
CreateAcceleratorTableW
CharNextExA
GetTopWindow
TranslateMessage
DrawTextW
advapi32
RegSetValueA
GetUserNameA
SetKernelObjectSecurity
RegUnLoadKeyW
PrivilegeCheck
RegisterServiceCtrlHandlerA
GetNamedSecurityInfoW
GetSecurityDescriptorControl
RegisterTraceGuidsA
SetThreadToken
OpenEventLogW
RegOpenKeyExA
GetUserNameW
GetSecurityDescriptorGroup
CryptDeriveKey
shell32
ShellExec_RunDLLW
SHHelpShortcuts_RunDLLA
StrStrIA
ExtractIconW
SHInvokePrinterCommandA
ExtractIconExA
StrRStrW
RealShellExecuteExW
DragFinish
gdi32
GetTextCharsetInfo
CreateFontIndirectA
StretchBlt
Pie
SetTextColor
ExtTextOutW
SetAbortProc
ArcTo
PlayMetaFileRecord
GetClipBox
StrokeAndFillPath
SetBitmapDimensionEx
CreateSolidBrush
EnumObjects
GetDIBits
GetKerningPairsW
SetPaletteEntries
EnumFontsW
Sections
.text Size: 9KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 84KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE