Static task
static1
Behavioral task
behavioral1
Sample
e611db98b529a9a726f639e7d09478dd8b893cd8ca8a7e93d023281bff72d0e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e611db98b529a9a726f639e7d09478dd8b893cd8ca8a7e93d023281bff72d0e4.exe
Resource
win10v2004-20220901-en
General
-
Target
e611db98b529a9a726f639e7d09478dd8b893cd8ca8a7e93d023281bff72d0e4
-
Size
475KB
-
MD5
81e0931196ad384fd1d36dc9e9716cb0
-
SHA1
b8ec9149bb19c72d718a8095b5ffe374c65243cf
-
SHA256
e611db98b529a9a726f639e7d09478dd8b893cd8ca8a7e93d023281bff72d0e4
-
SHA512
7777d49a21a4e17f53e575a676d26b1c4493f295e819afbb7037843096f3a5d682a648c0c88091a076cfde7ec7b5f2e49a8e582d213caea5c23d504fcc688bb5
-
SSDEEP
12288:8BkGNI0cDsO8lsktvYw+WeyLCJBXYXG1ZuonmPXhGqdftCcy2pEylRvq:8BXNI/sHlskhYw+WeyLiBR14OmPR9dfM
Malware Config
Signatures
Files
-
e611db98b529a9a726f639e7d09478dd8b893cd8ca8a7e93d023281bff72d0e4.exe windows x86
cc02837d74c2c80f7b5a88524d8918cf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCalendarInfoW
SetThreadIdealProcessor
DefineDosDeviceA
GetCurrentThreadId
GetFileAttributesExA
GlobalFindAtomW
IsDBCSLeadByte
GlobalWire
IsValidLanguageGroup
GetEnvironmentVariableA
ReplaceFileA
EnumResourceLanguagesA
CreateSemaphoreW
OpenWaitableTimerA
CompareStringA
CreateDirectoryW
FindCloseChangeNotification
WriteProfileSectionA
GetVolumePathNameW
VerSetConditionMask
CreateWaitableTimerA
GetCommMask
EnumDateFormatsA
ChangeTimerQueueTimer
GetNamedPipeHandleStateA
EnumResourceLanguagesW
EnumTimeFormatsA
WriteFileGather
_hread
GetProcessWorkingSetSize
CreateFileMappingW
FindResourceA
GetProcessPriorityBoost
GetThreadSelectorEntry
ContinueDebugEvent
SetLocalTime
IsValidCodePage
CreateFileW
DeleteTimerQueue
GetDriveTypeW
GetProcessShutdownParameters
SetThreadAffinityMask
GetCompressedFileSizeA
ResumeThread
OpenProcess
LocalLock
GetLastError
SetCalendarInfoW
CreateNamedPipeW
IsBadWritePtr
FindResourceExA
SetEndOfFile
CreateDirectoryExA
GetFileAttributesW
DeleteVolumeMountPointW
MoveFileW
EnumResourceTypesA
GetPrivateProfileStructW
DeviceIoControl
SetFileTime
GetAtomNameA
EndUpdateResourceA
GetCurrentDirectoryW
GetThreadTimes
MoveFileExA
GetProfileStringW
IsBadReadPtr
FindFirstVolumeW
PeekNamedPipe
GlobalAddAtomA
GetStringTypeExW
GetFileSize
RtlFillMemory
EndUpdateResourceW
SetSystemPowerState
BackupRead
GetStdHandle
SetVolumeMountPointW
InterlockedDecrement
CompareStringW
Beep
FreeUserPhysicalPages
GetLocaleInfoA
OutputDebugStringA
TlsSetValue
GetPrivateProfileSectionW
WaitForDebugEvent
GetTempFileNameA
CreateIoCompletionPort
EnumDateFormatsExA
GetVersionExA
GetSystemDefaultLangID
GetLogicalDriveStringsA
CreateTimerQueueTimer
ConnectNamedPipe
lstrcpyA
DnsHostnameToComputerNameA
GetPriorityClass
SetDefaultCommConfigW
DnsHostnameToComputerNameW
GetCurrentProcessId
DosDateTimeToFileTime
GetTempPathW
GlobalFree
FreeResource
GlobalAlloc
CreateTimerQueue
SetDefaultCommConfigA
Process32First
GetPrivateProfileStructA
FindAtomA
GetTickCount
EnumSystemLanguageGroupsW
WritePrivateProfileStructA
EnumDateFormatsExW
GetPrivateProfileSectionNamesA
BackupWrite
GetProcessVersion
UpdateResourceW
GetDefaultCommConfigW
SetEnvironmentVariableW
GetCommState
UpdateResourceA
CreateHardLinkA
DisconnectNamedPipe
WaitForMultipleObjectsEx
user32
SetPropW
LoadCursorFromFileW
GetSubMenu
SetScrollPos
BeginDeferWindowPos
DdeQueryConvInfo
SetKeyboardState
VkKeyScanExW
SetWinEventHook
InflateRect
SetCaretBlinkTime
DragObject
GetProcessDefaultLayout
GetSystemMenu
IMPGetIMEA
SetParent
GetDlgItemInt
CreatePopupMenu
AttachThreadInput
GetWindowTextLengthA
CharUpperBuffA
SetThreadDesktop
UnloadKeyboardLayout
DdeDisconnect
GetInputDesktop
FindWindowA
MessageBoxExW
PostThreadMessageW
ValidateRgn
DdeCreateStringHandleW
IsDialogMessageA
ShowWindowAsync
CreateCursor
MapVirtualKeyA
ReuseDDElParam
GetThreadDesktop
ShowScrollBar
CallWindowProcW
SwitchToThisWindow
CloseDesktop
CallMsgFilterW
AppendMenuA
NotifyWinEvent
SetWindowContextHelpId
GetMenuItemCount
FillRect
LoadAcceleratorsA
FreeDDElParam
EmptyClipboard
HiliteMenuItem
DlgDirListComboBoxA
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 167KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ