Static task
static1
Behavioral task
behavioral1
Sample
e546aa7aa99ef6cc0171770cc201aca5e4ca5ca78a6cdc619f612643a09f47cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e546aa7aa99ef6cc0171770cc201aca5e4ca5ca78a6cdc619f612643a09f47cd.exe
Resource
win10v2004-20220901-en
General
-
Target
e546aa7aa99ef6cc0171770cc201aca5e4ca5ca78a6cdc619f612643a09f47cd
-
Size
315KB
-
MD5
47abc33a83064ee2805ba5f76db47fa6
-
SHA1
d5f670f38c17de98064af3e9dd6ebfc29ee5993d
-
SHA256
e546aa7aa99ef6cc0171770cc201aca5e4ca5ca78a6cdc619f612643a09f47cd
-
SHA512
1aba8b4cdf0a3bb199c14f69d4d99c5ebddf443ae834f7759bb5eff06667df46baafd4a61605f37d26a960b15f5dd361aa36e79af24c5c6d5acf33654688e643
-
SSDEEP
6144:E6eTa0JNqToCbzI560abXzPNvst/eHo1IT3NQMYV+3euK4putQuU5z7qV7F:E9ZqHbzI5iDjNUpeIqTdQM7HutQuUtU
Malware Config
Signatures
Files
-
e546aa7aa99ef6cc0171770cc201aca5e4ca5ca78a6cdc619f612643a09f47cd.exe windows x86
9f48c5d41413db25d30d0a81c7f1c4b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_SYSTEM
IMAGE_FILE_UP_SYSTEM_ONLY
Imports
kernel32
LoadLibraryA
GetConsoleScreenBufferInfo
FileTimeToLocalFileTime
GetFileInformationByHandle
LocalFree
IsProcessorFeaturePresent
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapSize
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetLastError
GetStdHandle
SetConsoleTitleA
lstrlenW
CreateActCtxA
CreateFileW
FileTimeToSystemTime
GetConsoleWindow
GetProcessHandleCount
Sleep
GetVolumeInformationA
WideCharToMultiByte
GlobalAlloc
FillConsoleOutputCharacterA
GetConsoleTitleA
GetCurrentProcess
LoadLibraryW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
EncodePointer
GetModuleFileNameW
WriteFile
DecodePointer
ExitProcess
HeapFree
HeapAlloc
GetLocalTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleW
HeapReAlloc
user32
GetDialogBaseUnits
SetWindowTextW
FindWindowA
EndPaint
GetWindowRect
PostQuitMessage
SendDlgItemMessageA
DrawTextA
GetSubMenu
LoadBitmapA
wsprintfA
GetClientRect
GetWindowTextLengthA
SendMessageA
SetRectEmpty
BeginPaint
GetMenu
GetWindowTextA
CreateWindowExA
MonitorFromWindow
GetDlgItem
EndDialog
DefWindowProcA
SetWindowPos
SetMenuContextHelpId
IsDlgButtonChecked
MessageBoxW
IsWindowVisible
SetWindowTextA
LoadImageA
EnableWindow
gdi32
SetTextColor
GetBkMode
GetDeviceCaps
SetBkColor
SetBkMode
SelectObject
CreateCompatibleDC
SaveDC
TextOutA
advapi32
GetTokenInformation
OpenProcessToken
shell32
Shell_NotifyIconA
SHGetFolderPathW
shlwapi
StrDupA
rpcrt4
UuidCreate
dxva2
DestroyPhysicalMonitors
GetPhysicalMonitorsFromHMONITOR
GetNumberOfPhysicalMonitorsFromHMONITOR
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ