Static task
static1
Behavioral task
behavioral1
Sample
e922ac2641ec2a0c2f45efa8b058387aab9ce2add2deb7a277c10e88ddef8eaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e922ac2641ec2a0c2f45efa8b058387aab9ce2add2deb7a277c10e88ddef8eaa.exe
Resource
win10v2004-20220812-en
General
-
Target
e922ac2641ec2a0c2f45efa8b058387aab9ce2add2deb7a277c10e88ddef8eaa
-
Size
44KB
-
MD5
83ee434778579699b26ddf7b90cf7f30
-
SHA1
614297b13e15d5adb69ae0ce9b6c8f84507536ee
-
SHA256
e922ac2641ec2a0c2f45efa8b058387aab9ce2add2deb7a277c10e88ddef8eaa
-
SHA512
0edde462ac1137f810c3937f3221b0cbdc7405c02e062ad42b6ba95734046a72c346d10066fa553b94ddfd051ae2a0f6c908ecf4e0a1abeb062c3f8cb7330c07
-
SSDEEP
384:viT9NydzhZ9oOK1CjkilLjx7CyYxVdorxL6660aj/niBdQ647gYR7T:vkzy52OK1UjxGVHU66fM/niG7gYR7T
Malware Config
Signatures
Files
-
e922ac2641ec2a0c2f45efa8b058387aab9ce2add2deb7a277c10e88ddef8eaa.exe windows x86
ad7de82c0d1c7d1c92d946c3205eb977
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1997
ord6392
ord5194
ord533
ord6407
ord665
ord1979
ord798
ord5186
ord354
ord561
ord815
ord5778
ord1575
ord6883
ord825
ord823
ord4204
ord5710
ord2781
ord4058
ord3181
ord3178
ord926
ord537
ord2818
ord541
ord5861
ord922
ord4202
ord2764
ord535
ord941
ord939
ord4278
ord551
ord3811
ord2820
ord801
ord860
ord540
ord2915
ord5572
ord924
ord800
ord5683
ord4129
ord858
ord4277
ord356
ord2770
ord1980
ord6385
ord668
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
time
srand
rand
getenv
atoi
__CxxFrameHandler
_except_handler3
_mbscmp
kernel32
GetWindowsDirectoryA
CopyFileA
GetShortPathNameA
WaitForSingleObject
lstrlenA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
GetTempPathA
MultiByteToWideChar
SetFileAttributesA
GetFileAttributesA
CloseHandle
Process32Next
OpenProcess
WinExec
TerminateProcess
Process32First
CreateToolhelp32Snapshot
DeleteFileA
GetVersionExA
HeapDestroy
HeapAlloc
HeapCreate
WritePrivateProfileStringA
Sleep
advapi32
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetNamedSecurityInfoA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
AllocateAndInitializeSid
shell32
ShellExecuteExA
SHFileOperationA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
wininet
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ