Static task
static1
Behavioral task
behavioral1
Sample
e8e5aefef0e3638df73fc8c205266db6d32de499dc48ff20aa55198b3cfc858e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8e5aefef0e3638df73fc8c205266db6d32de499dc48ff20aa55198b3cfc858e.exe
Resource
win10v2004-20220901-en
General
-
Target
e8e5aefef0e3638df73fc8c205266db6d32de499dc48ff20aa55198b3cfc858e
-
Size
132KB
-
MD5
60126d73da1bf4086bb4b4db836829d0
-
SHA1
e9388118c83734c6939676281aa52a37c92d58c0
-
SHA256
e8e5aefef0e3638df73fc8c205266db6d32de499dc48ff20aa55198b3cfc858e
-
SHA512
8213ff36db6d6824cbce9210ab4e018ac2918fd59cdca3d0704be754ec03fb9e769baad9524cd997bc0c869e48572b13d5b6b62f9ea3f246bd8fd10b767a40e3
-
SSDEEP
3072:dUaEbjjNm3LiAS6l07NaWafsI+gB1CPvf6v53WmV7h:obnNspwMV+gB66h3D7
Malware Config
Signatures
Files
-
e8e5aefef0e3638df73fc8c205266db6d32de499dc48ff20aa55198b3cfc858e.exe windows x86
86b06f7e7dc2d0accb1b1ead44575cbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord185
gdi32
SetBkColor
SetRectRgn
CreateRoundRectRgn
CreatePatternBrush
StretchBlt
CreatePenIndirect
Escape
PtVisible
GetTextColor
GetTextExtentPoint32W
CreateBrushIndirect
CombineRgn
ExtTextOutW
GetDCOrgEx
EndPage
SetBrushOrgEx
GetStockObject
RoundRect
SelectClipRgn
GetSystemPaletteEntries
Rectangle
PolylineTo
ScaleWindowExtEx
PatBlt
DeleteDC
OffsetViewportOrgEx
GetBkColor
EndDoc
ExcludeClipRect
GetStretchBltMode
CreateBitmap
UnrealizeObject
ScaleViewportExtEx
CreateCompatibleBitmap
DeleteEnhMetaFile
RestoreDC
GetCurrentPositionEx
GetTextMetricsA
CreatePalette
CreateFontW
CreateFontIndirectW
SetROP2
LPtoDP
GetDeviceCaps
GetDIBits
CreateDCA
StretchDIBits
GetMapMode
GetBitmapBits
GetWindowOrgEx
SetStretchBltMode
ExtCreatePen
SetTextAlign
CreateDIBSection
SelectPalette
SetViewportExtEx
shlwapi
PathGetCharTypeA
kernel32
SetFilePointer
CompareStringW
CompareStringA
GetTimeZoneInformation
GetEnvironmentStringsW
GetCommandLineA
GetTickCount
GetModuleHandleW
lstrcmpA
VirtualAlloc
GetCurrentThread
HeapReAlloc
WaitForMultipleObjects
MultiByteToWideChar
WideCharToMultiByte
GetFileType
ExitProcess
CreateFileA
FormatMessageW
FindClose
FreeEnvironmentStringsW
SetEvent
LeaveCriticalSection
FileTimeToSystemTime
TlsAlloc
QueryPerformanceCounter
SetEnvironmentVariableA
RaiseException
GetACP
GetStringTypeW
TlsSetValue
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
GetModuleFileNameA
lstrlenW
TerminateProcess
GetVersionExW
LocalFree
WriteFile
InterlockedCompareExchange
LoadLibraryA
GetModuleFileNameW
CreateDirectoryW
FlushFileBuffers
GetCommandLineW
GetFileSize
TryEnterCriticalSection
SetErrorMode
EnterCriticalSection
TlsGetValue
CloseHandle
Sleep
FreeLibraryAndExitThread
WaitForSingleObjectEx
GetOEMCP
GetProcessHeap
InterlockedExchange
FindResourceW
ReadFile
SetHandleCount
HeapFree
CreateFileW
CreateEventW
LCMapStringW
CreateThread
GetCurrentProcess
InterlockedIncrement
IsDebuggerPresent
GetVersionExA
GetStartupInfoW
GetProcAddress
GetModuleHandleA
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetLastError
GetStartupInfoA
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
FreeLibrary
GetCPInfo
RtlUnwind
HeapSize
GetLocaleInfoA
GetLocaleInfoW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
LCMapStringA
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 512B - Virtual size: 267B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ