Static task
static1
Behavioral task
behavioral1
Sample
e1cd9aeb7e4a7a3b70892b412664a13c453b7a76a04aec443b11468143b3890c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1cd9aeb7e4a7a3b70892b412664a13c453b7a76a04aec443b11468143b3890c.exe
Resource
win10v2004-20220812-en
General
-
Target
e1cd9aeb7e4a7a3b70892b412664a13c453b7a76a04aec443b11468143b3890c
-
Size
144KB
-
MD5
4b0952bc615422470c17f6e358f56050
-
SHA1
87647d51b817480dd2a17b486a97540c75877edc
-
SHA256
e1cd9aeb7e4a7a3b70892b412664a13c453b7a76a04aec443b11468143b3890c
-
SHA512
623b59c44e10d8a34285e8c416cfec075174e6c71d0a91b00e1485b1d23ee725bba8d9357dac54535ec63bee2d6086bbfcf7e94ce4f2005b145b89fb6cac1b35
-
SSDEEP
1536:1TH6xygMonhVBKvo0+PNyAqvlFETnCBgTWlpCDnnm9oTPafp3UTStP/KNrUFg9:Vaxye9yAslbKmx1UetPCF99
Malware Config
Signatures
Files
-
e1cd9aeb7e4a7a3b70892b412664a13c453b7a76a04aec443b11468143b3890c.exe windows x86
8d691eed9206c0d1a9a9755517703603
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetTempPathA
DeleteFileA
InterlockedDecrement
GetModuleFileNameA
GetComputerNameA
InterlockedExchange
MultiByteToWideChar
GetLastError
lstrlenA
GetOEMCP
InterlockedIncrement
SetEndOfFile
LoadLibraryA
CopyFileA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
VirtualFree
ExitProcess
Sleep
CloseHandle
SetFilePointer
GetFileType
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
CreateFileA
SizeofResource
GetStdHandle
SetHandleCount
ReadFile
GetConsoleMode
GetConsoleCP
WriteFile
GetCurrentThreadId
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
VirtualAlloc
GetProcAddress
GetModuleHandleA
IsValidCodePage
user32
SetCursor
EndPaint
UnregisterClassA
DrawTextA
GetClientRect
BeginPaint
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostQuitMessage
SetWindowPos
GetWindowRect
LoadStringA
CreateWindowExA
SetTimer
GetWindowLongA
GetDC
EqualRect
UpdateLayeredWindow
SetWindowLongA
GetCursorPos
SetCapture
EndDialog
MoveWindow
GetWindowDC
ReleaseDC
ReleaseCapture
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostMessageA
LoadIconA
LoadCursorA
RegisterClassExA
gdi32
CreateDIBSection
SelectObject
GetDeviceCaps
DeleteDC
DeleteObject
CreateCompatibleDC
ole32
OleUninitialize
OleInitialize
OleDraw
OleRun
CoCreateInstance
OleSetContainedObject
OleCreate
oleaut32
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysFreeString
SysStringLen
SysAllocString
GetErrorInfo
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE