Static task
static1
Behavioral task
behavioral1
Sample
e3c58cee19c23cd60c1c8a6f74242aebd7bf6bc5edad503a59eee5827d546cae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3c58cee19c23cd60c1c8a6f74242aebd7bf6bc5edad503a59eee5827d546cae.exe
Resource
win10v2004-20220812-en
General
-
Target
e3c58cee19c23cd60c1c8a6f74242aebd7bf6bc5edad503a59eee5827d546cae
-
Size
180KB
-
MD5
6d3f6a598757a025bc5b42c0f3314660
-
SHA1
73cfd0d1b73fb03ee9001e986ef6ad14d0ab8ffb
-
SHA256
e3c58cee19c23cd60c1c8a6f74242aebd7bf6bc5edad503a59eee5827d546cae
-
SHA512
30e796f626d015d6cf270582bb299909a768c5f219b8982b2f38b1a80190ee252b0910f9f17fa3174a12e9df6066192c5771e8c4e9dedf00987b97c8a8bd8a14
-
SSDEEP
3072:pgG/m05FqTJ5uJ2Uq7IxGNOIOn03ZJXWtMdVDQe4PFPUEz:pggmZoWIGNOIv6+VH4dt
Malware Config
Signatures
Files
-
e3c58cee19c23cd60c1c8a6f74242aebd7bf6bc5edad503a59eee5827d546cae.exe windows x86
fd07c01939e4102574008ad5c583d6ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mfc42
ord3582
ord5849
ord4259
ord6602
ord4398
ord6592
ord5288
ord4439
ord2054
ord4431
ord6529
ord6568
ord6488
ord4284
ord4715
ord4218
ord2578
ord4673
ord4274
ord4486
ord2554
ord5731
ord3922
ord1089
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord4480
ord5199
ord4622
ord3738
ord561
ord5500
ord6354
ord5716
ord5717
ord1134
ord1205
ord2411
ord2023
ord6756
ord2629
ord1175
ord1799
ord614
ord1206
ord2623
ord290
ord4258
ord2859
ord4226
ord2486
ord4003
ord446
ord743
ord1601
ord3499
ord2515
ord355
ord3825
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord6028
ord4123
ord5850
ord4976
ord6282
ord6283
ord6876
ord4129
ord768
ord6485
ord6747
ord4835
ord5287
ord4854
ord4377
ord4948
ord4742
ord4905
ord5160
ord5162
ord5161
ord6242
ord3610
ord289
ord613
ord2754
ord283
ord5873
ord6172
ord6157
ord470
ord5791
ord755
ord795
ord3721
ord3692
ord1644
ord1641
ord6334
ord2370
ord2289
ord3237
ord616
ord5681
ord3097
ord6877
ord5953
ord323
ord3874
ord1640
ord5785
ord2414
ord640
ord3626
ord3571
ord4275
ord2528
ord1669
ord2652
ord3663
ord2438
ord3654
ord2584
ord4220
ord2863
ord5053
ord815
ord2725
ord3873
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord825
ord1199
ord5265
ord4078
ord6055
ord3597
ord4425
ord5280
ord1775
ord6052
ord4998
ord4853
ord692
ord609
ord3574
ord4396
ord2575
ord3639
ord4401
ord2581
ord4219
ord2024
ord2413
ord6366
ord1771
ord1816
ord1146
ord5268
ord1568
ord268
ord1180
ord2147
ord3797
ord5718
ord6197
ord2393
ord1567
ord5232
ord926
ord941
ord860
ord939
ord2818
ord5981
ord924
ord922
ord2817
ord2864
ord6215
ord2379
ord3092
ord540
ord4160
ord2642
ord656
ord4234
ord4376
ord1200
ord537
ord858
ord800
ord4710
ord3870
ord6195
ord1168
ord6199
ord2302
ord324
ord567
ord765
ord3698
ord4424
ord4627
ord4080
ord3079
ord1223
ord1202
ord5289
ord5714
ord2514
ord641
ord823
ord1576
msvcrt
wcscmp
_ftol
atof
_stricmp
_fcvt
__CxxFrameHandler
_EH_prolog
_beginthreadex
sprintf
atoi
strncpy
wcscpy
_CxxThrowException
strstr
ceil
floor
qsort
_itoa
strchr
__getmainargs
wcslen
wcscat
_strdup
memmove
wcsstr
_exit
__p__commode
_wcsicmp
_mbslen
_setmbcp
_XcptFilter
exit
_acmdln
_except_handler3
_initterm
__setusermatherr
_adjust_fdiv
??1type_info@@UAE@XZ
__p__fmode
__set_app_type
_controlfp
__dllonexit
_onexit
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
kernel32
GetProcessHeap
HeapAlloc
BuildCommDCBA
CopyFileA
CreateDirectoryA
CreateFileMappingA
CreateProcessA
CreateSemaphoreA
FindFirstFileA
FindNextFileA
FormatMessageA
GetCurrentDirectoryA
GetDateFormatA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetFullPathNameA
GetNumberFormatA
lstrcpyW
GetProfileIntA
GetShortPathNameA
GetSystemDirectoryA
GetTimeFormatA
GlobalAddAtomA
IsBadReadPtr
LCMapStringA
MoveFileA
MoveFileExA
OpenSemaphoreA
SetEnvironmentVariableA
WriteProfileStringA
WriteProfileStringW
SetFileAttributesW
SetEnvironmentVariableW
SetCurrentDirectoryW
OpenSemaphoreW
MoveFileExW
MoveFileW
LoadLibraryW
LCMapStringW
IsBadStringPtrW
GlobalAddAtomW
GetTimeFormatW
GetTempPathW
GetTempFileNameW
GetSystemDirectoryW
GetStringTypeW
GetStartupInfoW
GetShortPathNameW
GetProfileStringW
GetProfileIntW
GetNumberFormatW
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetFullPathNameW
GetFileAttributesW
GetDriveTypeW
GetStartupInfoA
GetACP
GetSystemTime
SetUnhandledExceptionFilter
OpenProcess
TerminateProcess
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
InterlockedIncrement
WriteFile
GetLastError
CreateThread
GetTickCount
lstrcatA
GetModuleFileNameA
GetTempPathA
GetTempFileNameA
SetFileAttributesA
GetModuleHandleA
Sleep
lstrlenA
MultiByteToWideChar
lstrcpyA
lstrlenW
WideCharToMultiByte
GetLocaleInfoA
GetVersion
GetSystemPowerStatus
FindResourceA
LoadResource
LockResource
CreateFileA
GetFileSize
ReadFile
GetCurrentThreadId
TerminateThread
SetEvent
GetUserDefaultLangID
CreateEventA
DeleteFileA
WaitForSingleObjectEx
GetExitCodeThread
CloseHandle
WaitForSingleObject
ExitThread
GlobalUnlock
GlobalFree
GlobalLock
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentDirectoryW
FindResourceW
FindNextFileW
FindFirstFileW
DeleteFileW
CreateSemaphoreW
CreateProcessW
CreateFileMappingW
CreateFileW
CreateEventW
CreateDirectoryW
CopyFileW
BuildCommDCBW
GetUserDefaultLCID
GetVersionExA
LocalFree
LocalAlloc
InterlockedExchange
RaiseException
SetCurrentDirectoryA
HeapFree
GetDiskFreeSpaceExW
gdi32
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateFontIndirectA
CreatePalette
SetBrushOrgEx
StretchDIBits
GetDeviceCaps
RealizePalette
GetTextExtentPoint32A
BitBlt
CreateSolidBrush
GetStockObject
GetTextMetricsA
SetTextColor
SetBkMode
DeleteDC
DeleteObject
CreateDCA
CreateEnhMetaFileA
CreateDCW
CreateICA
CreateMetaFileA
EnumFontFamiliesA
EnumFontsA
GetObjectA
GetObjectType
GetTextFaceA
StartDocA
StartDocW
GetTextMetricsW
GetTextFaceW
GetObjectW
EnumFontsW
EnumFontFamiliesW
CreateMetaFileW
CreateICW
CreateFontIndirectW
CreateFontW
CreateEnhMetaFileW
user32
InvalidateRect
FindWindowA
SetWindowPos
TrackPopupMenu
PostThreadMessageA
GetSystemMenu
EnableMenuItem
AppendMenuA
SystemParametersInfoA
GetDC
ReleaseDC
LoadBitmapA
GetSysColor
FillRect
LoadImageA
DrawIconEx
DrawTextA
DestroyIcon
PeekMessageA
TranslateMessage
DispatchMessageA
LoadMenuA
GetSubMenu
SetForegroundWindow
GetDesktopWindow
IsWindowEnabled
EnableWindow
GetActiveWindow
SetActiveWindow
IsWindowVisible
IsIconic
DestroyWindow
KillTimer
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
FlashWindow
GetClientRect
GetWindowRect
LoadIconA
LoadStringA
CallNextHookEx
PostMessageA
SendMessageA
DrawEdge
GetWindowThreadProcessId
EnumThreadWindows
CharLowerA
OemToCharA
HideCaret
ShowScrollBar
ReplyMessage
InSendMessage
CreateWindowExA
TrackMouseEvent
GetKeyState
SendMessageTimeoutA
GetWindowTextA
ShowWindow
GetWindowLongA
EnumWindows
MessageBoxA
PostQuitMessage
SetDlgItemTextA
SetPropA
IsCharAlphaNumericA
IsDialogMessageA
GetSystemMetrics
SetWindowsHookA
AppendMenuW
ChangeMenuW
CharLowerW
CharNextW
CharPrevW
CharToOemW
CharUpperW
CopyAcceleratorTableW
CreateAcceleratorTableW
CreateDialogParamW
CreateWindowExW
DefMDIChildProcW
DefWindowProcW
DialogBoxIndirectParamW
DispatchMessageW
FindWindowW
GetClassInfoW
GetClassLongW
GetClassNameW
GetClipboardFormatNameW
GetMenuStringW
GetMessageW
RemovePropW
GetPropW
SetPropW
GetWindowLongW
SetWindowLongW
IsWindowUnicode
CallWindowProcW
CallWindowProcA
ChangeMenuA
CharToOemA
CharUpperA
CopyAcceleratorTableA
CreateAcceleratorTableA
CreateDialogParamA
DefMDIChildProcA
DefWindowProcA
DialogBoxParamA
DialogBoxParamW
DialogBoxIndirectParamA
GetClassInfoA
GetClassLongA
GetClassNameA
GetClipboardFormatNameA
GetMenuStringA
GetMessageA
GetPropA
InsertMenuA
IsCharAlphaA
InsertMenuW
UnregisterClassW
LoadAcceleratorsA
LoadCursorA
ModifyMenuA
GetWindowTextW
RegisterClassA
RegisterClassExA
RegisterClipboardFormatA
RegisterWindowMessageA
RemovePropA
GetDlgItem
SetClassLongA
SetClassLongW
SetDlgItemTextW
SetWindowLongA
SetWindowTextA
TranslateAcceleratorA
UnregisterClassA
VkKeyScanA
WinHelpA
CharLowerBuffA
CharUpperBuffA
DrawTextW
CharUpperBuffW
CharLowerBuffW
wvsprintfW
WinHelpW
VkKeyScanW
RegisterClassW
TranslateAcceleratorW
SystemParametersInfoW
SetWindowTextW
SetWindowsHookW
IsCharAlphaNumericW
IsCharAlphaW
SendMessageTimeoutW
SendMessageW
SendDlgItemMessageW
RegisterWindowMessageW
RegisterClipboardFormatW
RegisterClassExW
LoadStringW
PostMessageW
PeekMessageW
OemToCharW
ModifyMenuW
MessageBoxW
LoadMenuW
LoadIconW
LoadCursorW
LoadBitmapW
LoadAcceleratorsW
IsDialogMessageW
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
InitCommonControlsEx
oleaut32
SysAllocString
SysFreeString
mspgimme
SetupGimme
EPLoadMSO
xpage3b
ord102
ord608
ord509
ord627
ord626
ord500
ord302
ord321
ord305
ord101
ord301
ord304
ord306
ord320
ord322
ord308
ord613
ord106
ord317
ord100
ord501
ord318
ord300
shell32
DragQueryFileW
DragQueryFileA
ShellExecuteW
ShellExecuteA
comdlg32
GetFileTitleW
GetFileTitleA
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.scansrv Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE