Static task
static1
Behavioral task
behavioral1
Sample
e395359ac7e14b9e5f2e975a69a01a022e9f1833982d1c12835f4bc8837d03e6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e395359ac7e14b9e5f2e975a69a01a022e9f1833982d1c12835f4bc8837d03e6.exe
Resource
win10v2004-20220812-en
General
-
Target
e395359ac7e14b9e5f2e975a69a01a022e9f1833982d1c12835f4bc8837d03e6
-
Size
180KB
-
MD5
a02b3eb77df5a4177627dfbfb0f834d0
-
SHA1
9d26385f268253dd543d599eb68d7d04ff5b2196
-
SHA256
e395359ac7e14b9e5f2e975a69a01a022e9f1833982d1c12835f4bc8837d03e6
-
SHA512
4d8b4892457092a2a8e7fe9867ba31c4ad11fbeb7f8a9e1b2ee8ac244c70379d7f568a9569273be78099b77e6142a6caffff3d9cbd69e1e00837a5da09c38818
-
SSDEEP
3072:olLCHXaCdhv4DVwveIa1PU1hN6OhFHU1XsQoTN3uDuFdUsu1oME/RiFE:4Cv3W71PUJ6OhFHU+QSNHR7EE
Malware Config
Signatures
Files
-
e395359ac7e14b9e5f2e975a69a01a022e9f1833982d1c12835f4bc8837d03e6.exe windows x86
17fa76bfc7079dcb333cfeda53c9f770
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
user32
BeginPaint
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndPaint
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetSystemMetrics
InvalidateRect
LoadCursorA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PtInRect
ReleaseDC
SendMessageA
SetWindowLongA
ShowWindow
TranslateMessage
wsprintfA
UpdateWindow
kernel32
DeleteFileA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTickCount
LoadLibraryA
VirtualProtect
lstrlenA
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1ARRAY@@UAE@XZ
??1DSTRING@@UAE@XZ
??1OBJECT@@UAE@XZ
??1STRING_ARGUMENT@@UAE@XZ
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?FreeLibraryHandle@SYSTEM@@SGXPAX@Z
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@FLAG_ARGUMENT@@QAEEPAD@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?Initialize@WSTRING@@QAEEPBDK@Z
?IsValueSet@ARGUMENT@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?QueryDriveType@SYSTEM@@SG?AW4DRIVE_TYPE@@PBVWSTRING@@@Z
?QueryInvalidArgument@ARGUMENT_LEXEMIZER@@QAEPAVWSTRING@@XZ
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Strcat@WSTRING@@QAEEPBV1@@Z
?QueryLibraryEntryPoint@SYSTEM@@SGP6GHXZPBVWSTRING@@0PAPAX@Z
ifsutil
?QueryFileSystemName@IFS_SYSTEM@@SGEPBVWSTRING@@PAV2@PAJ1@Z
?DosDriveNameToNtDriveName@IFS_SYSTEM@@SGEPBVWSTRING@@PAV2@@Z
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
gdi32
CreateCompatibleDC
DeleteDC
DeleteObject
GetStockObject
SelectObject
GetObjectA
Sections
AUTO Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ