Static task
static1
Behavioral task
behavioral1
Sample
e7c469ec307f89da38f6447812476508abc3e8460573c52b6013c9f59df133d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7c469ec307f89da38f6447812476508abc3e8460573c52b6013c9f59df133d2.exe
Resource
win10v2004-20220812-en
General
-
Target
e7c469ec307f89da38f6447812476508abc3e8460573c52b6013c9f59df133d2
-
Size
1.5MB
-
MD5
6a179779c7ca7db570d37407bdea1e63
-
SHA1
841d1ceb0a0af0aed4b8825da00b8ddf227c9230
-
SHA256
e7c469ec307f89da38f6447812476508abc3e8460573c52b6013c9f59df133d2
-
SHA512
72351ede5110fc9e63f448636eb207e63d803190abe00fbb53e0e15050324314a44726a3a9255ffa436b05d99d4f1096c7b8f0c6b61d533d06441b25894c9b48
-
SSDEEP
24576:+Gk70TyY41P1vRNGaNyfaF8KJflTfbP1eH:fvY1vRJNaa2Uf9b9m
Malware Config
Signatures
Files
-
e7c469ec307f89da38f6447812476508abc3e8460573c52b6013c9f59df133d2.exe windows x86
8f1c303675e12767a838735f94f17f45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
odbc32
ord57
ord31
ord75
ord24
ord36
ws2_32
WSAStartup
WSACleanup
kernel32
GetDriveTypeA
PeekNamedPipe
GetFileInformationByHandle
ReadFile
GetCurrentDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
LocalFree
LocalUnlock
LocalLock
LocalAlloc
GetModuleFileNameA
MoveFileExA
CloseHandle
GetFileSize
CreateFileA
GetSystemDirectoryA
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
TlsFree
GetSystemTimeAsFileTime
TlsSetValue
TlsGetValue
TlsAlloc
GetFileAttributesExA
CreateEventA
SetEvent
ResetEvent
WaitForMultipleObjects
WaitForSingleObject
TryEnterCriticalSection
SetThreadPriority
ExitProcess
GetCommandLineA
GetVersionExA
HeapFree
WideCharToMultiByte
GetTimeZoneInformation
TerminateProcess
GetCurrentProcess
HeapAlloc
SetStdHandle
GetFileType
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
GetFullPathNameA
ExitThread
ResumeThread
CreateThread
HeapReAlloc
SetHandleCount
SetEnvironmentVariableW
GetStartupInfoA
FatalAppExitA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
RtlUnwind
GetTimeFormatA
GetDateFormatA
GetCPInfo
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
FlushFileBuffers
RaiseException
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
SetFilePointer
VirtualProtect
GetSystemInfo
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapSize
LCMapStringA
LCMapStringW
GetLocaleInfoW
SetConsoleCtrlHandler
SetCurrentDirectoryA
FindNextFileA
GetStdHandle
user32
MessageBoxA
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExA
RegEnumValueA
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE