Static task
static1
Behavioral task
behavioral1
Sample
e8de83d8b030f3eca1cfe27f80c634239fa2176aaa276b3c4278a0a307f58e29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8de83d8b030f3eca1cfe27f80c634239fa2176aaa276b3c4278a0a307f58e29.exe
Resource
win10v2004-20220901-en
General
-
Target
e8de83d8b030f3eca1cfe27f80c634239fa2176aaa276b3c4278a0a307f58e29
-
Size
769KB
-
MD5
05ddbccfd7739d625b4328dd864fe9cc
-
SHA1
809bf2f50ea1cc1bd9660c33c3dfaa00fc1ea27a
-
SHA256
e8de83d8b030f3eca1cfe27f80c634239fa2176aaa276b3c4278a0a307f58e29
-
SHA512
24c49fd4f78405c48312440af0f3ffbc51d4614bd4b453afc9478fd8f0d4edaa82c5b46a932dba658b46eae7282d5777d389f92ff9fdad804757571712d06390
-
SSDEEP
6144:cC/VNYZ7eh5L0cUBiHEAAgxvQn5vSf+zhxf/acSw5yl+ozRtioYmOhfV0wgPB0Yl:cx1iHHAIw5vc+TiLHWfIeGaUOoTSc
Malware Config
Signatures
Files
-
e8de83d8b030f3eca1cfe27f80c634239fa2176aaa276b3c4278a0a307f58e29.exe windows x86
628816f06e529333d5ac7c0faa68aad1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragFinish
DragQueryFileA
ExtractIconA
SHGetFolderPathA
ShellExecuteA
SHGetFileInfoA
kernel32
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
LoadLibraryW
GetSystemDirectoryW
RtlUnwind
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
CreateDirectoryA
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
TlsSetValue
SetHandleCount
GetStdHandle
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetModuleHandleW
GetDiskFreeSpaceA
GetTempFileNameA
GetTickCount
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
InterlockedExchange
GetFileTime
GetFileSizeEx
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
GetShortPathNameA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpiA
GetThreadLocale
GetStringTypeExA
MoveFileA
lstrcmpA
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
GetModuleFileNameW
GetModuleHandleA
SetLastError
GlobalFree
GlobalAlloc
LocalFree
GetProcessHeap
HeapFree
MultiByteToWideChar
GetLastError
GetProcAddress
GlobalUnlock
GlobalLock
InterlockedDecrement
FormatMessageA
LocalAlloc
InterlockedIncrement
DeleteFileA
GetCurrentDirectoryA
lstrcpynA
GetEnvironmentVariableA
GetTempPathA
CopyFileA
GetFileAttributesA
GetUserDefaultLangID
WritePrivateProfileStringA
MulDiv
GetModuleFileNameA
GetPrivateProfileIntA
FindNextFileA
FreeResource
GetPrivateProfileStringA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetSystemDirectoryA
FindFirstFileA
FindClose
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
HeapSize
CreateFileW
user32
SetRect
GetDCEx
LockWindowUpdate
DestroyIcon
PostThreadMessageA
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
SetWindowContextHelpId
MapDialogRect
RegisterClipboardFormatA
ShowOwnedPopups
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
IsZoomed
SetParent
GetSystemMenu
DeleteMenu
IsRectEmpty
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
CharUpperA
GetCursorPos
WindowFromPoint
ShowWindow
MoveWindow
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
IsChild
UnregisterClassA
GetSysColorBrush
DeferWindowPos
GetScrollInfo
SetScrollInfo
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetCapture
SetWindowRgn
RegisterWindowMessageA
DrawIcon
LoadBitmapA
FillRect
GetClientRect
BeginPaint
EndPaint
InvalidateRect
SetTimer
KillTimer
EnableWindow
SetCursor
PtInRect
InflateRect
SendMessageA
GetWindowRect
ScreenToClient
GetDC
ReleaseDC
GetParent
GetMessagePos
IsWindow
GetSysColor
MessageBeep
CopyIcon
LoadCursorA
SetWindowLongA
LoadStringA
wsprintfA
SetMenuItemInfoA
GetMenuItemInfoA
GetMenuItemCount
GetSubMenu
SetWindowTextA
GetDlgCtrlID
CheckMenuRadioItem
AppendMenuA
GetWindow
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetMenuItemID
InsertMenuA
UpdateWindow
GetMenuState
DrawMenuBar
PostMessageA
EnumChildWindows
GetMenuStringA
gdi32
CreateSolidBrush
CreateCompatibleBitmap
GetCharWidthA
StretchDIBits
CreateEllipticRgn
LPtoDP
Ellipse
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
GetBkColor
GetTextColor
GetRgnBox
CreatePatternBrush
CreateBitmap
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateFontA
GetObjectA
GetTextMetricsA
GetStockObject
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
BitBlt
CreateICA
GetDeviceCaps
DeleteDC
DeleteObject
GetTextExtentPoint32A
CreateFontIndirectA
StretchBlt
DPtoLP
CreateCompatibleDC
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
GetFileSecurityA
SetFileSecurityA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegSetValueA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegCreateKeyA
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
CLSIDFromString
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
CoTaskMemFree
CLSIDFromProgID
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateInstance
OleRun
CoUninitialize
CoInitializeEx
CoTaskMemAlloc
oleaut32
SysAllocString
SysStringLen
SysFreeString
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
GetActiveObject
GetErrorInfo
VariantChangeType
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
shlwapi
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecW
PathIsUNCA
Sections
.text Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ