Static task
static1
Behavioral task
behavioral1
Sample
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe
Resource
win10v2004-20220812-en
General
-
Target
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802
-
Size
134KB
-
MD5
0c949933a2e9af9593314215e3d4b399
-
SHA1
49d2ffb2113f7bf628b4feba26fdc95ce15e273d
-
SHA256
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802
-
SHA512
35741e4ab98625634176aadb19b932c2c4a2235290765cad524c803dfaf5ee876978dadac5ffd540c3e4d7e6d1fc3adeae0663a8614a751e03c7e79971c0dceb
-
SSDEEP
3072:Xyh7+Xeo46jZz076KWQyWCGLm8+ndws6:XGC9jN076KgWCG6LE
Malware Config
Signatures
Files
-
e382320d8c2019d27c53d2218eaf12c20fff7f92db1760d7bf13c12fa2c32802.exe windows x86
de184af8104f342830e4aa65564ed741
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
LoadLibraryA
BuildCommDCBA
HeapAlloc
EnterCriticalSection
GetSystemTimeAsFileTime
InterlockedIncrement
OutputDebugStringW
UnhandledExceptionFilter
lstrcmpiW
CreateMutexW
WideCharToMultiByte
WaitForSingleObject
VirtualFree
GetModuleFileNameW
TerminateProcess
HeapFree
CreateThread
IsDebuggerPresent
SetLastError
SizeofResource
LoadLibraryExW
LeaveCriticalSection
LoadResource
WaitNamedPipeW
SetEvent
FlushInstructionCache
WaitForMultipleObjects
MultiByteToWideChar
CreateEventW
VirtualAlloc
FreeLibrary
GetCurrentProcess
InterlockedCompareExchange
TerminateThread
DeleteCriticalSection
Sleep
lstrlenW
FormatMessageW
LocalFree
GetCurrentThreadId
GetCurrentProcessId
FindResourceW
QueryPerformanceCounter
SetUnhandledExceptionFilter
CloseHandle
InterlockedExchange
ResetEvent
GetModuleHandleW
GetPriorityClass
InitializeCriticalSection
GetVersionExW
InterlockedDecrement
IsProcessorFeaturePresent
RaiseException
GetStartupInfoW
LoadLibraryW
GetVersion
VirtualProtect
LoadLibraryExA
GetProcAddress
GetLastError
GetTickCount
lstrlenA
ReleaseMutex
ExitProcess
user32
GetMessageW
AppendMenuW
CallWindowProcW
SetMenuItemInfoW
GetSysColorBrush
SetMenuDefaultItem
LoadImageW
DestroyMenu
RegisterWindowMessageW
GetMenuItemCount
SetTimer
PostMessageW
FillRect
TrackPopupMenu
GetClassInfoExW
KillTimer
CreateWindowExW
PostQuitMessage
DestroyIcon
GetSysColor
GetSubMenu
DefWindowProcW
LoadMenuW
LoadStringW
DispatchMessageW
SystemParametersInfoW
DrawIconEx
IsWindow
DrawTextW
GetMenuItemInfoW
ReleaseDC
SetForegroundWindow
FindWindowW
LoadCursorW
GetDoubleClickTime
IsMenu
GetDC
SetWindowLongW
CreatePopupMenu
TranslateMessage
RegisterClassExW
UnregisterClassA
GetSystemMetrics
DestroyWindow
DeleteMenu
CharNextW
GetCursorPos
GetWindowLongW
gdi32
SetTextColor
DeleteObject
SelectObject
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
GetUserNameA
RegEnumValueW
RegOpenKeyExW
RegSetValueExW
RegNotifyChangeKeyValue
RegQueryInfoKeyW
ole32
CoTaskMemRealloc
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
wldap32
ord197
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ