Static task
static1
Behavioral task
behavioral1
Sample
e7877ef0ea0472b1edc77194b12be47b6d33124d6e03ae05857567ac60523439.exe
Resource
win7-20220901-en
General
-
Target
e7877ef0ea0472b1edc77194b12be47b6d33124d6e03ae05857567ac60523439
-
Size
116KB
-
MD5
0c282cf72ce278c83b098d947d542930
-
SHA1
81a802ef0f1f3579da693f570ccf449f60d8f68a
-
SHA256
e7877ef0ea0472b1edc77194b12be47b6d33124d6e03ae05857567ac60523439
-
SHA512
757e2dda0d29189a511084d04a5c48ef85cfd3b65acc492ae51a02e93b8eab97343bda90255b309043a34a23b87bb02531545c9317011ba4e9f971fb443f11c4
-
SSDEEP
3072:9aUM6S85NFctXOxVk2Tm4O1kS9tpiZdDGAdYI269DpD+643IGT:1Df1ctXOx+2TtO1irv+zT
Malware Config
Signatures
Files
-
e7877ef0ea0472b1edc77194b12be47b6d33124d6e03ae05857567ac60523439.exe windows x86
b0d9b12dabef05fd9512d7042e66dcdf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntA
CreateProcessA
TerminateProcess
CreateToolhelp32Snapshot
GetPrivateProfileStringA
Process32First
Process32Next
CloseHandle
GetFileAttributesA
WritePrivateProfileStringA
CreateDirectoryA
GetModuleFileNameA
VirtualFree
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
OutputDebugStringA
SetFilePointer
WriteFile
CreateFileA
FileTimeToSystemTime
SetEndOfFile
ReadFile
GetProcessTimes
FileTimeToLocalFileTime
GetModuleHandleA
GetThreadLocale
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetACP
InterlockedExchange
GetVersionExA
user32
CallWindowProcA
DispatchMessageA
CreateWindowExA
GetMessageA
SetWindowLongA
DestroyWindow
IsWindow
TranslateMessage
MessageBoxA
GetWindowLongA
shell32
SHGetSpecialFolderPathA
msvcp80
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
msvcr80
_getpid
_vsnprintf_s
__argc
_snprintf
atol
malloc
fopen
free
fread
_time64
fclose
atoi
_mbsrchr
sscanf
memmove
??_V@YAXPAX@Z
??2@YAPAXI@Z
_access
strftime
_localtime64
__argv
realloc
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_invalid_parameter_noinfo
??3@YAXPAX@Z
__CxxFrameHandler3
memcpy
memset
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE