Static task
static1
Behavioral task
behavioral1
Sample
e7cfd33e2119b7d0060cf93a8589068a4799db200223f33a4a4cd9bdc20e11ea.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7cfd33e2119b7d0060cf93a8589068a4799db200223f33a4a4cd9bdc20e11ea.exe
Resource
win10v2004-20220812-en
General
-
Target
e7cfd33e2119b7d0060cf93a8589068a4799db200223f33a4a4cd9bdc20e11ea
-
Size
184KB
-
MD5
6a0f81359037cae4afb548651a051ca0
-
SHA1
a9c10f4d40449efba22955eb4e5ed8b0306c8f6d
-
SHA256
e7cfd33e2119b7d0060cf93a8589068a4799db200223f33a4a4cd9bdc20e11ea
-
SHA512
245cce2b4abec22861c9f59c3b525c998e60b0c3e0e590b3dd37dd5a3d3517a06af72e72087bcfe8eb5bcc7a7cba7bbf8c284b5ef93466256cd75f97313946bd
-
SSDEEP
1536:C9LDK1Oqal9PvjLrRcEJLUamCfBuUqDnx/Fq/bZq/A30oSq2AuqsVmaFM0glWex/:IqEx8W2B5EXrLzCiZxM+OMsH7hi
Malware Config
Signatures
Files
-
e7cfd33e2119b7d0060cf93a8589068a4799db200223f33a4a4cd9bdc20e11ea.exe windows x86
bce737212209330e2d2285bb1c7e684d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
CharLowerA
DestroyWindow
MessageBoxA
DialogBoxIndirectParamA
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
BringWindowToTop
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
wsprintfA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
advapi32
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerInstallFileA
kernel32
HeapSize
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapReAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CopyFileA
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
VirtualAlloc
IsBadHugeWritePtr
SwitchToThread
lstrcmpW
PeekConsoleInputW
WriteProfileStringW
GetModuleHandleW
CompareStringW
SetErrorMode
CreateFileA
CreateProcessA
GetPrivateProfileIntA
MultiByteToWideChar
GlobalFree
GlobalUnlock
WideCharToMultiByte
lstrlenW
CloseHandle
Sleep
DeleteFileA
GetAtomNameA
RtlUnwind
GetModuleFileNameA
GetUserDefaultLangID
GlobalAlloc
GlobalLock
GetVersionExA
GetPrivateProfileStringA
CompareStringA
lstrlenA
SetLastError
CreateDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
GetShortPathNameA
GetLastError
SetFileAttributesA
WaitForSingleObject
GetTempPathA
GetTempFileNameA
OpenEventA
SetEvent
FormatMessageA
LocalFree
RemoveDirectoryA
FindResourceExA
FindResourceA
LoadResource
LockResource
HeapFree
HeapAlloc
GetCommandLineA
GetSystemTimeAsFileTime
GetStartupInfoA
RaiseException
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ