Static task
static1
Behavioral task
behavioral1
Sample
e14f900d039fd6ba7de5a5a1924e900c094e18cf0d87ce85adb6dd4a740c60c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e14f900d039fd6ba7de5a5a1924e900c094e18cf0d87ce85adb6dd4a740c60c2.exe
Resource
win10v2004-20220812-en
General
-
Target
e14f900d039fd6ba7de5a5a1924e900c094e18cf0d87ce85adb6dd4a740c60c2
-
Size
670KB
-
MD5
2dead29866d8e9b3aa9b9955f172c110
-
SHA1
43c1aa0358d7766eda36fd3ef1628964718e82e0
-
SHA256
e14f900d039fd6ba7de5a5a1924e900c094e18cf0d87ce85adb6dd4a740c60c2
-
SHA512
28f95d3c208ad8bdaf8d9c475ac8dce851df46326b3eae3111dd7ad3e8e27ac71d460c3b3673e062394ecdc67eeb8bb8df08eb27e4ed62d432fcb650678a5c4a
-
SSDEEP
12288:95yJRH+WisxJ+GiYiCWJcox6bDKBjWlTmn1BKy27imkGS:95yJRH+1411iZJcoxYDKBjWlOBKy27W
Malware Config
Signatures
Files
-
e14f900d039fd6ba7de5a5a1924e900c094e18cf0d87ce85adb6dd4a740c60c2.exe windows x86
257e9b427d674283a096cc132a35c2b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdiplus
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipFree
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToFile
GdiplusShutdown
GdiplusStartup
ws2_32
WSACleanup
closesocket
gethostbyname
htons
recv
socket
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyExA
RegNotifyChangeKeyValue
RegSetValueExA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToSystemTime
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentProcess
GetCurrentThreadId
GetFileInformationByHandle
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTime
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
MoveFileA
MultiByteToWideChar
OpenMutexA
ReadFile
ReleaseMutex
ReleaseSemaphore
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
msvcrt
_fdopen
_read
_stricmp
_tzset
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
calloc
clock
fclose
fflush
fgetpos
fopen
fputc
fputs
fread
free
fsetpos
fwrite
getc
getenv
getwc
iswctype
localeconv
localtime
malloc
memchr
memcmp
memcpy
memmove
mktime
putc
putwc
rand
realloc
setlocale
setvbuf
signal
sprintf
srand
strchr
strcmp
strcoll
strcpy
strerror
strftime
strlen
strncpy
strtod
strxfrm
time
towlower
towupper
ungetc
ungetwc
vfprintf
wcscmp
wcscoll
wcsftime
wcslen
wcsxfrm
shell32
SHGetFolderPathA
ShellExecuteA
user32
CallNextHookEx
CloseClipboard
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetClipboardData
GetDC
GetForegroundWindow
GetKeyState
GetMessageA
GetSystemMetrics
GetWindowTextA
GetWindowTextLengthW
LoadCursorA
LoadIconA
OpenClipboard
PostQuitMessage
RegisterClassExA
ReleaseDC
SendMessageA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
Sections
.text Size: 513KB - Virtual size: 512KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE