Static task
static1
Behavioral task
behavioral1
Sample
e6b41d2b83182a383186fb8edce60c555c89da6533ecabe80b88d3b41d518719.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6b41d2b83182a383186fb8edce60c555c89da6533ecabe80b88d3b41d518719.exe
Resource
win10v2004-20220901-en
General
-
Target
e6b41d2b83182a383186fb8edce60c555c89da6533ecabe80b88d3b41d518719
-
Size
1.3MB
-
MD5
923a6cab91637e23e5899096ca892c39
-
SHA1
cf03c63f3239ced79f3c838fe16b94f8b2202651
-
SHA256
e6b41d2b83182a383186fb8edce60c555c89da6533ecabe80b88d3b41d518719
-
SHA512
f3d115ef4b7558de5ef5f67e49ac395cda8e781f5eeaeae3557c13fa90e73343f6caa29c0754265367b0c0a1078f32a94d576e69d721a0dc95debac970d9fdf1
-
SSDEEP
24576:BxqSLgrtbBUIcgu5yjymxRuWyZG86kQcB:BxPLlujymKRX6kQcB
Malware Config
Signatures
Files
-
e6b41d2b83182a383186fb8edce60c555c89da6533ecabe80b88d3b41d518719.exe windows x86
5a4491e9f35531e7f43c7c4dc9496ecc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
SystemTimeToFileTime
GetTimeZoneInformation
ResumeThread
FileTimeToSystemTime
ResetEvent
ReleaseMutex
CreateMutexA
LocalFree
GetLastError
GetCurrentThread
GetCurrentProcess
FlushFileBuffers
ConnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
WriteFile
ReadFile
DisconnectNamedPipe
SetConsoleCtrlHandler
Sleep
InterlockedDecrement
InterlockedIncrement
GetSystemTime
GetModuleFileNameW
CreateEventA
SetEvent
WaitForMultipleObjects
CloseHandle
WaitForSingleObject
GetExitCodeThread
CreateEventW
SuspendThread
TerminateThread
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCurrentThreadId
CreateThread
HeapFree
HeapAlloc
GetVersionExA
GetProcessHeap
GetSystemTimeAsFileTime
GetCPInfo
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetProcAddress
GetModuleHandleA
ExitProcess
GetStringTypeA
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetStdHandle
GetModuleFileNameA
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
advapi32
GetSecurityDescriptorLength
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTokenInformation
AllocateAndInitializeSid
RevertToSelf
FreeSid
ImpersonateNamedPipeClient
OpenProcessToken
EqualSid
OpenThreadToken
StartServiceW
StartServiceCtrlDispatcherW
ControlService
QueryServiceConfigW
CreateServiceW
DeleteService
SetServiceStatus
OpenServiceW
RegisterServiceCtrlHandlerExW
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
RegEnumValueW
RegNotifyChangeKeyValue
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
InitializeSecurityDescriptor
ole32
CoCreateInstance
CLSIDFromString
CoInitialize
CoUninitialize
oleaut32
SysFreeString
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ