Static task
static1
Behavioral task
behavioral1
Sample
e4454e39777fa19eb254bf1d839f0230186d76d6baa68a52c3a27587eee57f34.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4454e39777fa19eb254bf1d839f0230186d76d6baa68a52c3a27587eee57f34.exe
Resource
win10v2004-20220812-en
General
-
Target
e4454e39777fa19eb254bf1d839f0230186d76d6baa68a52c3a27587eee57f34
-
Size
58KB
-
MD5
776714d9640e2ffe48ce2324c12bf770
-
SHA1
5945fdf232d8d59784c5a7bf40a7a1be2b787c9e
-
SHA256
e4454e39777fa19eb254bf1d839f0230186d76d6baa68a52c3a27587eee57f34
-
SHA512
2a5c185c8475cc7c0fe4fa653239ea21562c98f7cc27a07d87b9776941e6a0998a31dff5d1bf5f4a0ac903b1b3d8bdb758ad471e5fa862872448606dddafbe81
-
SSDEEP
1536:08u2maZ/ZRNs4OJnW2T+vlO0YahSMl57h:hTg4OJ1Ks6SMl5
Malware Config
Signatures
Files
-
e4454e39777fa19eb254bf1d839f0230186d76d6baa68a52c3a27587eee57f34.exe windows x86
19861b67460da8347fcc33ed32e6ee8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetModuleBaseNameA
comctl32
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_SetBkColor
kernel32
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
TerminateProcess
ReadFile
WriteFile
DuplicateHandle
Process32Next
Module32Next
OpenProcess
Module32First
Process32First
CreateToolhelp32Snapshot
CreateFileA
GetProcAddress
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemInfo
VirtualProtect
GetLocaleInfoA
VirtualQuery
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLongPathNameW
VirtualFreeEx
GetModuleHandleA
GetCurrentProcess
GetLastError
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
LoadLibraryA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
RaiseException
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
HeapFree
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
user32
ClientToScreen
GetClientRect
GetSysColor
PostMessageA
GetDlgItem
MoveWindow
UpdateWindow
GetWindowRect
GetWindowPlacement
EndDialog
SetWindowPlacement
SendMessageA
MessageBoxA
LoadIconA
DialogBoxParamA
InvalidateRect
advapi32
CloseServiceHandle
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
ControlService
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ExtractIconExA
ShellExecuteExA
SHFileOperationA
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ