Static task
static1
Behavioral task
behavioral1
Sample
e3a688f67fe106909ac7ba702223004179ddc43e37880cf4d7dcc03c63e842e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3a688f67fe106909ac7ba702223004179ddc43e37880cf4d7dcc03c63e842e0.exe
Resource
win10v2004-20220812-en
General
-
Target
e3a688f67fe106909ac7ba702223004179ddc43e37880cf4d7dcc03c63e842e0
-
Size
80KB
-
MD5
2fa4fc348a295be6d17a273c6d380cce
-
SHA1
1419d7dd3b776209d0cccbac93a1db4f1118152b
-
SHA256
e3a688f67fe106909ac7ba702223004179ddc43e37880cf4d7dcc03c63e842e0
-
SHA512
1c5327857f3b3f41b260ded3be1055bd07a368e4aae8d5b24193e654be495b0076eb3a1461dc9b3d5b9327dd74efa9d738d9ffff88a919fcdf0a2d9695fa541b
-
SSDEEP
1536:QZ+xV+MTlk7IOlIOInToIfiOn2C6123njHVUhrO7:QcVZTqtvsTBfiOn2X1Mj+m
Malware Config
Signatures
Files
-
e3a688f67fe106909ac7ba702223004179ddc43e37880cf4d7dcc03c63e842e0.exe windows x86
0ffffb54a3de687fc532b3e90a0e5013
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentProcessId
GetSystemTimeAsFileTime
ReadFile
DeleteFileW
FreeLibrary
CloseHandle
GetProcAddress
CreateFileW
LoadLibraryW
WriteFile
UnhandledExceptionFilter
user32
EndDialog
MessageBoxW
PostQuitMessage
TrackPopupMenu
GetSubMenu
LoadMenuW
ClientToScreen
EndPaint
BeginPaint
DefWindowProcW
RedrawWindow
DestroyWindow
DialogBoxParamW
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
GetWindowLongW
SetWindowLongW
ReleaseDC
GetSystemMetrics
GetDC
FillRect
SetWindowPos
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
CreateSolidBrush
PlayEnhMetaFile
BitBlt
DeleteDC
GetEnhMetaFileW
GetDeviceCaps
DeleteEnhMetaFile
CopyEnhMetaFileW
DeleteObject
GetEnhMetaFileHeader
msvcr80
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
memcpy
memset
_except_handler4_common
_wfopen
fseek
fread
_wtempnam
fclose
free
fwrite
??3@YAXPAX@Z
??2@YAPAXI@Z
malloc
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__CxxFrameHandler3
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ