Static task
static1
Behavioral task
behavioral1
Sample
e492f825a2cdef35f65fb9244e7927b74ffa67b52779deaeb644c39b3062640f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e492f825a2cdef35f65fb9244e7927b74ffa67b52779deaeb644c39b3062640f.exe
Resource
win10v2004-20220812-en
General
-
Target
e492f825a2cdef35f65fb9244e7927b74ffa67b52779deaeb644c39b3062640f
-
Size
4.3MB
-
MD5
ed20179244b0ce8e6757afc801c9057b
-
SHA1
76517cc73b54aaddb9bb3725e4db820f83f8dd73
-
SHA256
e492f825a2cdef35f65fb9244e7927b74ffa67b52779deaeb644c39b3062640f
-
SHA512
15d6fa6e0fde164502350f382c9da3a4e3a54bdde6ee7b0b4f5d9b2e50e5dcb058da952e27796bddd4f9a94d17edfa1f2b171c7bdf14a012409278cd46cb15f0
-
SSDEEP
98304:aC6Yxp4J9I5IsrvBkKBhBR2TLMVvF1zaHs1Tgx2m/dg19n3ZiPm8E+fOui5+Ep:J/5ZvBkghBQ8XuHHx50Zi5/muC+Ep
Malware Config
Signatures
Files
-
e492f825a2cdef35f65fb9244e7927b74ffa67b52779deaeb644c39b3062640f.exe windows x86
aebdf34c1de9e9f6da9e95ff1f955201
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetPathFromIDListW
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHGetMalloc
SHBrowseForFolderW
SHGetSpecialFolderLocation
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentProcess
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetVersionExW
GetModuleHandleW
ExpandEnvironmentStringsW
CreateFileW
GetCommandLineW
DeleteFileW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
FormatMessageW
InterlockedExchangeAdd
SetEndOfFile
SetFileTime
WriteFile
SetFilePointer
GetFileSize
ReadFile
MultiByteToWideChar
WideCharToMultiByte
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetLongPathNameW
MoveFileW
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetFileAttributesW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetACP
WaitForMultipleObjects
ResumeThread
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
user32
TranslateMessage
IsWindowVisible
EnableWindow
GetMessageW
KillTimer
DispatchMessageW
PostQuitMessage
CreateDialogParamW
ScreenToClient
DestroyIcon
IsWindow
ShowWindow
MessageBoxW
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetWindowTextW
SetWindowTextW
GetDlgItem
SendMessageW
EndDialog
SetFocus
LoadIconW
GetActiveWindow
GetDesktopWindow
LoadStringW
SetTimer
IsDialogMessageW
gdi32
DeleteObject
CreateSolidBrush
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 257KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ