Static task
static1
Behavioral task
behavioral1
Sample
ee2c88cff4de042769a5c4888b832d0c0cb869582cb15980a082209a7208b2a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee2c88cff4de042769a5c4888b832d0c0cb869582cb15980a082209a7208b2a6.exe
Resource
win10v2004-20220901-en
General
-
Target
ee2c88cff4de042769a5c4888b832d0c0cb869582cb15980a082209a7208b2a6
-
Size
676KB
-
MD5
7bc308e898bae3b846c42dfcc5adbf3a
-
SHA1
31a2fe700906b53f434c155d7b245e3a888c3f4a
-
SHA256
ee2c88cff4de042769a5c4888b832d0c0cb869582cb15980a082209a7208b2a6
-
SHA512
545a70a71b23f7350f6b7d70bc3f72fdec52829f574e77f9ac65cc837350dbfa05428c55327b4c88c8a12d575ab86f4c1f2263a6c9ac9f8516d0f74d8401c01e
-
SSDEEP
12288:6nO7R4MEqiC8X7UsKK9pxG/gXcQd9l4Shu81gAFA+Y:td4MEqin7UsM/euY7yx
Malware Config
Signatures
Files
-
ee2c88cff4de042769a5c4888b832d0c0cb869582cb15980a082209a7208b2a6.exe windows x86
7b6903821d3f67e838e5439872a5564b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpSendRequestA
InternetGetLastResponseInfoA
InternetOpenUrlA
InternetGetConnectedState
InternetQueryOptionA
InternetOpenA
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
OpenThreadToken
RegDeleteValueA
OpenSCManagerA
OpenServiceA
RegOpenKeyA
GetTokenInformation
mfc42
ord1576
user32
BeginPaint
GetClientRect
GetClassNameW
PostMessageW
IsWindowVisible
SetActiveWindow
ScreenToClient
GetIconInfo
FillRect
GetForegroundWindow
TrackPopupMenu
LoadMenuW
GetWindow
GetWindowPlacement
LoadStringW
ReleaseDC
GetMenuItemInfoW
OpenClipboard
GetDlgItemInt
SetScrollPos
EnumChildWindows
RegisterClipboardFormatW
SetRect
GetMessageW
DefWindowProcW
GetWindowLongW
RegisterClassExW
GetMenu
SystemParametersInfoW
TrackPopupMenuEx
SetWindowTextW
SetTimer
SetClipboardData
GetClassInfoW
SystemParametersInfoA
SendMessageTimeoutW
CreateWindowExW
GetActiveWindow
GetSubMenu
LoadIconW
RegisterClassW
SetWindowRgn
WindowFromPoint
InvalidateRect
GetCursorPos
GetClassInfoExW
GetWindowRect
CheckMenuItem
EndPaint
kernel32
TlsAlloc
InterlockedDecrement
TlsSetValue
RaiseException
CompareStringA
VirtualAlloc
UnhandledExceptionFilter
ExitProcess
GetCurrentThreadId
InitializeCriticalSection
HeapAlloc
CompareStringW
HeapCreate
GetEnvironmentStringsW
IsBadWritePtr
LCMapStringA
GetVersion
IsBadCodePtr
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentThread
SetConsoleCtrlHandler
TlsFree
QueryPerformanceCounter
GetSystemTime
GetStringTypeW
HeapDestroy
RtlUnwind
ReadFile
GetModuleFileNameA
GetCPInfo
SetStdHandle
IsBadReadPtr
WideCharToMultiByte
GetTickCount
TerminateProcess
GetCurrentProcessId
GetEnvironmentStrings
LoadLibraryA
GetCommandLineA
HeapReAlloc
HeapFree
WriteFile
MultiByteToWideChar
FlushFileBuffers
GetLastError
TlsGetValue
LeaveCriticalSection
SetLastError
GetStringTypeA
GetCommandLineW
LCMapStringW
GetFileType
FreeEnvironmentStringsW
GetStdHandle
EnterCriticalSection
GetSystemTimeAsFileTime
CreateMutexW
GetCurrentProcess
GetLocalTime
FatalAppExitA
GetModuleHandleA
CloseHandle
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetModuleFileNameW
GetModuleHandleW
VirtualQuery
InterlockedIncrement
GetProcAddress
VirtualFree
SetHandleCount
InterlockedExchange
SetFilePointer
SetEnvironmentVariableA
GetTimeZoneInformation
shell32
SHGetMalloc
SHGetSpecialFolderLocation
ExtractIconW
DragQueryPoint
ShellExecuteW
ExtractIconExW
SHGetPathFromIDListW
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 446KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ