Static task
static1
Behavioral task
behavioral1
Sample
e960939f42c56111ae3f134c64c4e4d9fb1c0b8b528472d8c7c2e880f4af93af.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e960939f42c56111ae3f134c64c4e4d9fb1c0b8b528472d8c7c2e880f4af93af.exe
Resource
win10v2004-20220812-en
General
-
Target
e960939f42c56111ae3f134c64c4e4d9fb1c0b8b528472d8c7c2e880f4af93af
-
Size
103KB
-
MD5
2d57292427e62b7078b790b97aa98110
-
SHA1
1bf7d90b37e83d5f63ad2b586db2280d76c338e2
-
SHA256
e960939f42c56111ae3f134c64c4e4d9fb1c0b8b528472d8c7c2e880f4af93af
-
SHA512
bd183ee1b82bae049e9b2252ca8f5257c527b82e6e293864383bc6a252bf75702e509bdb1e6f564ccaff47817c73c731c948a8b7a3fea79f56b886614f50eb6b
-
SSDEEP
1536:XEMegL7LnLNiz9+y+1Rvo4BUEZ2c8eYFc6V8ziNsyn1xKturVQnpFO:XE6LvnLqaUDc8398ziyTO
Malware Config
Signatures
Files
-
e960939f42c56111ae3f134c64c4e4d9fb1c0b8b528472d8c7c2e880f4af93af.exe windows x86
b63bb5fbf9828ee4cf2047deab1f0e2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDirectoryW
GetDiskFreeSpaceA
CopyFileW
GetFullPathNameA
SetEnvironmentVariableA
GetCommandLineA
GetStringTypeExA
GetDriveTypeA
lstrcmpiW
GetFileTime
GetCPInfo
IsBadCodePtr
GetCurrentProcessId
GetModuleFileNameA
GetThreadLocale
GetPrivateProfileStringA
FileTimeToSystemTime
GetSystemTime
lstrlenA
GetSystemDefaultLCID
lstrlenW
CreateProcessW
InterlockedIncrement
LCMapStringA
VirtualProtect
GetStartupInfoA
WideCharToMultiByte
DeleteFileA
GetModuleHandleA
GetVersionExA
GetExitCodeProcess
LoadResource
GetACP
DeviceIoControl
GetTempPathW
IsDebuggerPresent
RemoveDirectoryA
CopyFileA
QueryPerformanceCounter
WaitForMultipleObjects
FreeEnvironmentStringsW
GetVersionExW
GetUserDefaultLangID
GetVersion
InterlockedDecrement
ExitProcess
SetFileTime
OutputDebugStringA
GetModuleFileNameW
GetCommandLineW
OpenProcess
MoveFileA
GetFileAttributesA
IsBadReadPtr
GetEnvironmentStringsW
GetTempPathA
GetModuleHandleW
msvcrt
__p__commode
_except_handler3
__set_app_type
__p__fmode
_exit
_XcptFilter
_adjust_fdiv
__p___initenv
_initterm
__getmainargs
_controlfp
__setusermatherr
user32
SetCapture
GetDCEx
RegisterWindowMessageA
OffsetRect
GetClientRect
FindWindowA
DestroyCursor
DrawMenuBar
InvalidateRect
ScreenToClient
GetScrollInfo
OpenClipboard
SendDlgItemMessageA
SetFocus
SetMenu
DrawEdge
UpdateWindow
InflateRect
TrackPopupMenu
GetCapture
GetScrollPos
SetActiveWindow
GetMessagePos
EqualRect
SystemParametersInfoA
PostQuitMessage
GetSubMenu
GetScrollRange
GetWindowRect
GetActiveWindow
DestroyWindow
MessageBoxA
IsZoomed
GetTopWindow
advapi32
RegDeleteValueW
RegDeleteKeyW
IsValidSid
SetSecurityDescriptorOwner
OpenSCManagerA
LookupPrivilegeValueW
RegEnumValueA
GetLengthSid
SetSecurityDescriptorDacl
RegCreateKeyA
InitiateSystemShutdownA
OpenServiceW
RegEnumKeyA
LookupPrivilegeValueA
AddAccessAllowedAce
OpenThreadToken
CopySid
InitializeSecurityDescriptor
RegQueryInfoKeyW
CryptGenRandom
RegSetValueExA
CryptDestroyHash
AdjustTokenPrivileges
QueryServiceStatus
CloseServiceHandle
RegEnumValueW
RegEnumKeyExA
GetTokenInformation
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExA
RegFlushKey
EqualSid
AllocateAndInitializeSid
RegDeleteKeyA
CryptHashData
DeleteService
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ