Static task
static1
Behavioral task
behavioral1
Sample
e7b5a57e46c398c78e78f97f796ce89182f7e957ad58c81e36b1baa398d43e5f.exe
Resource
win7-20220812-en
General
-
Target
e7b5a57e46c398c78e78f97f796ce89182f7e957ad58c81e36b1baa398d43e5f
-
Size
833KB
-
MD5
274fdd8825bdfe0a50734768a0e85c40
-
SHA1
fc4390c3b082cee4a98207b36ac15b605d7a6103
-
SHA256
e7b5a57e46c398c78e78f97f796ce89182f7e957ad58c81e36b1baa398d43e5f
-
SHA512
9579a8ec34f21234fcd800304567733eb1e8afff18d89e6cf640f865638c8314812e537d295168f243086c050052385ac245ccc4ecc7af069b21af337583e63f
-
SSDEEP
24576:+jk2it9CM2EjR7wkALkyyI4rtiTsL5XQuE:ShxM22R7wkKFfTqXQuE
Malware Config
Signatures
Files
-
e7b5a57e46c398c78e78f97f796ce89182f7e957ad58c81e36b1baa398d43e5f.exe windows x86
27b79ade943621d04efa772268382e33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
FreeResource
InterlockedExchange
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
InterlockedDecrement
GetModuleHandleA
ReleaseMutex
lstrlenA
InterlockedIncrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetStartupInfoW
UnhandledExceptionFilter
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
GlobalFree
lstrcmpW
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalAlloc
InterlockedCompareExchange
GetProcessHeap
VirtualAlloc
GetVersionExA
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
GetCurrentThreadId
IsDebuggerPresent
CreateDirectoryW
SetUnhandledExceptionFilter
CreateProcessA
CompareStringA
CompareStringW
MultiByteToWideChar
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
GetThreadLocale
lstrlenW
GetFileSizeEx
GetFileTime
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
WideCharToMultiByte
WriteFile
ReadFile
CreateFileA
SetEndOfFile
SetFilePointer
GetSystemDirectoryA
GetModuleHandleW
OpenFileMappingW
UnmapViewOfFile
MapViewOfFile
GetSystemTime
DefineDosDeviceW
GetLogicalDrives
GetLocalTime
FreeLibrary
LoadLibraryExW
MoveFileW
ExpandEnvironmentStringsW
Sleep
GetCurrentProcess
CreateMutexW
OpenMutexW
SetCurrentDirectoryW
SetErrorMode
Process32NextW
TerminateProcess
OpenProcess
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
ExitProcess
GetVolumeInformationW
DeviceIoControl
RemoveDirectoryW
CreateFileW
GetFileAttributesW
GetFullPathNameW
SetFileAttributesW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteFileW
GetPrivateProfileIntW
GetVersionExW
GetLastError
GetCurrentDirectoryW
CreateProcessW
WinExec
GetWindowsDirectoryW
GetPrivateProfileStringW
GetProcAddress
LoadLibraryW
FindClose
FindNextFileW
CopyFileW
FindFirstFileW
GetSystemDirectoryW
WritePrivateProfileStringW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
VirtualProtect
GetModuleFileNameW
user32
SetCapture
InvalidateRgn
InvalidateRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
DestroyMenu
LoadCursorW
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
ReleaseDC
ReleaseCapture
UnregisterClassW
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
PostMessageW
EnableWindow
KillTimer
SetTimer
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
MessageBoxW
CreateWindowExW
GetNextDlgGroupItem
MessageBeep
PostThreadMessageW
GetClassInfoExW
GetClassInfoW
RegisterClipboardFormatW
GetDC
SendMessageW
LoadIconW
GetDesktopWindow
IsWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnumDisplaySettingsW
ChangeDisplaySettingsExW
GetKeyState
CharUpperW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindow
GetWindowRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongW
GetWindowLongW
GetMenu
PtInRect
CopyRect
CallWindowProcW
DefWindowProcW
GetDlgCtrlID
SetWindowPlacement
RegisterClassW
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
gdi32
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
DeleteDC
ExtSelectClipRgn
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetDeviceCaps
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
CreateRectRgnIndirect
GetObjectW
SetBkColor
SetTextColor
GetClipBox
SelectObject
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueExA
RegQueryValueW
RegEnumKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyW
RegOpenKeyExW
RegDeleteKeyW
RegOpenKeyW
RegCloseKey
RegSetValueExW
shell32
SHChangeNotify
SHGetFolderPathW
SHCreateDirectoryExW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsA
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathIsDirectoryW
PathFileExistsW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoFreeUnusedLibraries
CoTaskMemFree
OleInitialize
CoUninitialize
CoInitializeEx
CreateILockBytesOnHGlobal
OleUninitialize
OleRun
CoCreateInstance
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysStringLen
SysFreeString
SysAllocStringLen
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
GetErrorInfo
ws2_32
ntohl
htonl
psapi
GetModuleFileNameExW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 510KB - Virtual size: 509KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 111KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE