Static task
static1
Behavioral task
behavioral1
Sample
e053ae1bda13aee12b8943b6a8eef153ec565246b3f22880dd2272686eb61422.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e053ae1bda13aee12b8943b6a8eef153ec565246b3f22880dd2272686eb61422.exe
Resource
win10v2004-20220812-en
General
-
Target
e053ae1bda13aee12b8943b6a8eef153ec565246b3f22880dd2272686eb61422
-
Size
3.0MB
-
MD5
738b3c792ddc6f68cd1e4893114be188
-
SHA1
84a7dce1c33f89e954f96ad2bbe0b048a1e442c8
-
SHA256
e053ae1bda13aee12b8943b6a8eef153ec565246b3f22880dd2272686eb61422
-
SHA512
137eafe877b4a67246ed3b0b5cfee5144e96509667023c7f7b0be990253326150bf3c316b03ce19fa6f302c8bdaec8d04ee8a1e79471fb5a34f8763a0522bccb
-
SSDEEP
98304:cFKglyo6jHfz3NUyguiRgCdAGvuomEF3OcrFn:bo6jHTSAMRdbxmYR
Malware Config
Signatures
Files
-
e053ae1bda13aee12b8943b6a8eef153ec565246b3f22880dd2272686eb61422.exe windows x86
d5fbadaf5763d832de5d6927cd8add12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
VerifyVersionInfoW
GetLastError
GetProcAddress
HeapSize
GlobalFree
DecodePointer
lstrcatW
DeleteCriticalSection
CloseHandle
DeleteFileW
lstrcpyW
CreateMutexW
FreeLibrary
Sleep
GetSystemInfo
ReleaseMutex
lstrcmpiA
CreateThread
FindFirstFileW
MapViewOfFile
UnmapViewOfFile
CreateDirectoryW
CopyFileW
ReadFile
WritePrivateProfileStringW
FindClose
CreateFileMappingW
lstrcmpiW
FindNextFileW
GlobalUnlock
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LoadLibraryExW
LoadLibraryW
LCMapStringW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
lstrlenW
InitializeCriticalSectionEx
MultiByteToWideChar
lstrcmpW
CreateFileW
GetModuleFileNameW
MulDiv
GlobalAlloc
WriteFile
GetProcessHeap
GetModuleHandleW
GlobalLock
HeapFree
HeapReAlloc
GetCurrentProcess
MoveFileExW
VerSetConditionMask
HeapAlloc
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleExW
ExitProcess
GetCurrentThreadId
SetLastError
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
EncodePointer
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
WaitNamedPipeW
GetExitCodeProcess
OpenMutexW
SetNamedPipeHandleState
WideCharToMultiByte
IsDebuggerPresent
user32
ReleaseDC
MessageBoxW
GetDesktopWindow
SendMessageW
MapDialogRect
LoadImageW
DialogBoxIndirectParamW
SetFocus
SetRect
GetDlgItem
EndDialog
SendDlgItemMessageW
ShowWindow
IsDlgButtonChecked
CreateWindowExW
CheckRadioButton
GetDlgItemTextW
SetDlgItemTextW
EnableWindow
GetDlgCtrlID
SetWindowTextW
wsprintfW
GetDC
gdi32
SetBkColor
DeleteObject
CreateFontW
CreateSolidBrush
EnumFontFamiliesW
GetDeviceCaps
SetTextColor
advapi32
RegCloseKey
RegDeleteTreeW
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
shell32
ord75
SHFileOperationW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
CoInitialize
CLSIDFromString
shlwapi
PathFindFileNameW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathFindExtensionW
PathRemoveExtensionW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
comctl32
ord17
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ