Static task
static1
Behavioral task
behavioral1
Sample
e0d4bae58f52069a4ce50f947378e8ae278a8d396d26e3211e8b50b48ef2bc44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0d4bae58f52069a4ce50f947378e8ae278a8d396d26e3211e8b50b48ef2bc44.exe
Resource
win10v2004-20220812-en
General
-
Target
e0d4bae58f52069a4ce50f947378e8ae278a8d396d26e3211e8b50b48ef2bc44
-
Size
162KB
-
MD5
563207b22fc65d25e5cd58521ee81690
-
SHA1
e1a5dd675ff33daea97f19abc239197b23e87a6b
-
SHA256
e0d4bae58f52069a4ce50f947378e8ae278a8d396d26e3211e8b50b48ef2bc44
-
SHA512
4d9b6debda2b8f6abbfad2cec07e5cdcac01ff7e34c94aea25f79130ffc4948992c84492048d1e5f1a4eb4ae3c34524091490b1b51b8875241a04442cfeeef6d
-
SSDEEP
3072:zTPBHaVNmGaCUFiA6MpQDujMfg8d81vSsMehbyLciVGMjMxvpytvGoXRi79EDw3:zlyQPYA6MmDnovSs4LjMKDRIEc3
Malware Config
Signatures
Files
-
e0d4bae58f52069a4ce50f947378e8ae278a8d396d26e3211e8b50b48ef2bc44.exe windows x86
e47b73b720704dc75c43c7d3bf4cd6aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
CreateDirectoryExA
Module32First
GetSystemInfo
GetThreadLocale
UpdateResourceW
VirtualUnlock
GetLongPathNameA
LoadLibraryW
dciman32
DCICreateOverlay
DCIOpenProvider
DCICreatePrimary
DCICloseProvider
WinWatchOpen
WinWatchNotify
DCICreateOffscreen
WinWatchDidStatusChange
DCIDestroy
GetDCRegionData
WinWatchGetClipList
DCISetSrcDestClip
DCIDraw
DCISetDestination
ntdll
NtWaitForMultipleObjects
NtSetBootOptions
ZwMapUserPhysicalPages
NtAccessCheckByTypeResultListAndAuditAlarm
NtLockRegistryKey
__toascii
RtlAcquirePebLock
NtWaitLowEventPair
NtCreateWaitablePort
ZwOpenFile
sqlsrv32
SQLColAttributeW
SQLSetDescFieldW
SQLSetConnectOptionW
SQLDescribeColW
SQLExecDirectW
SQLCopyDesc
BCP_colfmt
SQLNumParams
SQLDisconnect
SQLSetStmtAttrW
SQLSetPos
SQLRowCount
SQLSetEnvAttr
SQLNumResultCols
SQLCancel
crypt32
I_CryptGetAsn1Encoder
CryptSIPRemoveProvider
CertUnregisterSystemStore
CertVerifyTimeValidity
CryptStringToBinaryA
CertSaveStore
CertEnumSystemStore
I_CryptInsertLruEntry
CertRDNValueToStrW
utildll
QueryCurrentWinStation
GetUserFromSid
GetUnknownString
RegGetNetworkDeviceName
StrConnectState
SetupAsyncCdConfig
WinEnumerateDevices
TestUserForAdmin
CompareElapsedTime
CachedGetUserFromSid
InitializeAnonymousUserCompareList
StrSystemWaitReason
GetSystemMessageW
ConfigureModem
ParseDecoratedAsyncDeviceName
ElapsedTimeString
StrProcessState
AsyncDeviceEnumerate
InstallModem
DateTimeString
NetworkDeviceEnumerate
StandardErrorMessage
StrSdClass
IsPartOfDomain
FormDecoratedAsyncDeviceName
msv1_0
MsvGetLogonAttemptCount
MsvSamValidate
Msv1_0SubAuthenticationPresent
LsaApCallPackage
SpUserModeInitialize
LsaApCallPackagePassthrough
SpInitialize
LsaApLogonTerminated
LsaApLogonUserEx2
MsvSamLogoff
LsaApInitializePackage
SpLsaModeInitialize
SpInstanceInit
Msv1_0ExportSubAuthenticationRoutine
LsaApCallPackageUntrusted
ifsutil
?QueryNtfsVersion@IFS_SYSTEM@@SGEPAE0PAVLOG_IO_DP_DRIVE@@PAX@Z
?GetNextDataSlot@TLINK@@QAEAAVBIG_INT@@XZ
?Initialize@INTSTACK@@QAEEXZ
?GetDrive@SUPERAREA@@QAEPAVIO_DP_DRIVE@@XZ
??0LOG_IO_DP_DRIVE@@QAE@XZ
?QuerySize@TLINK@@QBEGXZ
?SetVolumeLabelAndPrintFormatReport@VOL_LIODPDRV@@QAEEPBVWSTRING@@PAVMESSAGE@@@Z
?IsThisNtfs@IFS_SYSTEM@@SGEVBIG_INT@@KPAX@Z
?Initialize@READ_CACHE@@QAEEPAVIO_DP_DRIVE@@K@Z
??0SPARSE_SET@@QAE@XZ
?GetCannedSecurityDescriptor@CANNED_SECURITY@@QAEPAXW4_CANNED_SECURITY_TYPE@@PAK@Z
?Initialize@DIGRAPH@@QAEEK@Z
??1CANNED_SECURITY@@UAE@XZ
?IsArcSystemPartition@IFS_SYSTEM@@SGEPBVWSTRING@@PAE@Z
?ShellSort@TLINK@@QAEXXZ
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ