Static task
static1
Behavioral task
behavioral1
Sample
e5eed7a7e10028085cfcc67d099e0702e1b59040dec8310a3a85512441af34b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5eed7a7e10028085cfcc67d099e0702e1b59040dec8310a3a85512441af34b9.exe
Resource
win10v2004-20220901-en
General
-
Target
e5eed7a7e10028085cfcc67d099e0702e1b59040dec8310a3a85512441af34b9
-
Size
326KB
-
MD5
9013fa60c92127321e2d673701c86250
-
SHA1
9e7d56aa2d01a03a481807c0a44128af2500cdb8
-
SHA256
e5eed7a7e10028085cfcc67d099e0702e1b59040dec8310a3a85512441af34b9
-
SHA512
ac8f638928ee6b3905881f0847e7e968f0a6a467438613b841367e68ed3b5f2be7655c027da9813c77bb2e3d549aba9f0d70195ecd52ab3aec1b8a632940d3ca
-
SSDEEP
6144:7kM3X3+xQHATGlvpz2mJ60NNJm1DDn2zWVX9ZiGxxGzWqiGWPiBNWdoeLcwu:7v3XDHxfdNuLVvRxpqivKBNhTw
Malware Config
Signatures
Files
-
e5eed7a7e10028085cfcc67d099e0702e1b59040dec8310a3a85512441af34b9.exe windows x86
36f811eeb5af41e51f44bb4e6b5efc51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RevertToSelf
CreateServiceA
LookupPrivilegeNameW
RegOpenKeyExW
CryptGetUserKey
CryptGetDefaultProviderW
CryptReleaseContext
CryptExportKey
RegNotifyChangeKeyValue
RegOpenKeyW
CryptDestroyKey
AbortSystemShutdownW
CryptSetProviderW
RegReplaceKeyA
LookupPrivilegeDisplayNameW
RegQueryInfoKeyW
StartServiceA
CryptDeriveKey
kernel32
GetCPInfo
MultiByteToWideChar
GetModuleHandleW
HeapDestroy
FreeLibrary
GetFileType
HeapReAlloc
GetEnvironmentStringsW
GetModuleFileNameA
VirtualQuery
HeapFree
HeapSize
SetStdHandle
EnterCriticalSection
InterlockedDecrement
GetStartupInfoA
WriteConsoleA
GetEnvironmentStrings
ExitProcess
GetLocaleInfoA
TlsGetValue
FreeEnvironmentStringsW
GetCurrentThread
VirtualFree
IsValidCodePage
LCMapStringW
CompareStringA
GetDateFormatA
CompareStringW
ReadConsoleInputW
SetLastError
InterlockedExchange
GetStringTypeW
UnhandledExceptionFilter
GetCurrentProcessId
SetFilePointer
CreateFileA
GetTimeZoneInformation
LoadLibraryA
RtlUnwind
CreateMutexA
EnumSystemLocalesA
TlsAlloc
GetLastError
Sleep
TlsSetValue
ReadFile
TlsFree
GetConsoleMode
GetStdHandle
GetProcAddress
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetCurrentProcess
IsValidLocale
GetModuleHandleA
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLocaleInfoW
WriteConsoleW
WideCharToMultiByte
FreeEnvironmentStringsA
VirtualAlloc
HeapCreate
OpenMutexA
GetStringTypeA
TerminateProcess
GetCommandLineA
GetConsoleCP
SetConsoleCtrlHandler
GetTickCount
HeapAlloc
LCMapStringA
WriteFile
InterlockedIncrement
SetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
GetFileTime
GetConsoleOutputCP
LeaveCriticalSection
CloseHandle
DeleteCriticalSection
FlushFileBuffers
GetACP
GetTimeFormatA
GetCurrentThreadId
AddAtomW
QueryPerformanceCounter
GetOEMCP
wininet
InternetCloseHandle
gdi32
GetICMProfileW
GetLayout
GetMetaFileBitsEx
SetMetaFileBitsEx
DeleteMetaFile
TextOutW
DrawEscape
CreateICA
CreatePen
GetTextFaceW
GetCharWidthFloatW
GetKerningPairsW
SetMapperFlags
ColorMatchToTarget
EnumICMProfilesW
CreateDiscardableBitmap
SetBkColor
CreatePolygonRgn
CombineTransform
GetCharABCWidthsW
SelectClipPath
SetBrushOrgEx
GetViewportOrgEx
comdlg32
PageSetupDlgA
FindTextA
FindTextW
user32
MessageBoxA
DestroyCursor
DdeQueryStringW
KillTimer
CreateWindowExA
ShowWindow
RegisterClassExA
ChangeClipboardChain
DefFrameProcW
GetSystemMenu
CountClipboardFormats
SendNotifyMessageA
GetMenuCheckMarkDimensions
RegisterClassA
CreateIconIndirect
comctl32
InitCommonControlsEx
CreateStatusWindowW
DrawStatusTextW
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ