Static task
static1
Behavioral task
behavioral1
Sample
e34ef17ffa683abbceea9eda0bc36c3c9fbd330d5f12c3124217ab376a078946.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e34ef17ffa683abbceea9eda0bc36c3c9fbd330d5f12c3124217ab376a078946.exe
Resource
win10v2004-20220812-en
General
-
Target
e34ef17ffa683abbceea9eda0bc36c3c9fbd330d5f12c3124217ab376a078946
-
Size
700KB
-
MD5
0c9284613d9294b78a19f9c51858fdbd
-
SHA1
93adb7a581e56b9d2804636b1b4708f38a840fdf
-
SHA256
e34ef17ffa683abbceea9eda0bc36c3c9fbd330d5f12c3124217ab376a078946
-
SHA512
85ff645be52bbf685cf6c77fa1b7470559c4f60256591863f143bc54997f30bca781db66905fb5cfe0e5184d77e2d51c08edba9e4c6996ce1b81eca76911f943
-
SSDEEP
12288:qHY88kMPeTTKaJwZj4Bv1zjSI9+WiKZztv721FYipNRkuFG5:qP8lKwZazbtvy1F/O6G5
Malware Config
Signatures
Files
-
e34ef17ffa683abbceea9eda0bc36c3c9fbd330d5f12c3124217ab376a078946.exe windows x86
3640f1207eede1b07a3f06504e50d2cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LoadTypeLi
comdlg32
ChooseFontA
GetSaveFileNameA
shell32
DragQueryFileA
DragQueryFileW
SHGetMalloc
ord155
user32
WindowFromPoint
RegisterClassExW
GetNextDlgGroupItem
FillRect
DefWindowProcW
GetActiveWindow
SetCapture
SystemParametersInfoW
SetMenu
FrameRect
PtInRect
PostMessageW
DestroyWindow
RegisterClassW
EmptyClipboard
GetNextDlgTabItem
GetDlgCtrlID
GetTopWindow
SetWindowPos
GetMenuItemInfoW
GetDesktopWindow
IsWindowEnabled
InvalidateRect
DrawIconEx
MoveWindow
ScreenToClient
IsClipboardFormatAvailable
DrawEdge
GetClassNameW
MessageBoxW
CreatePopupMenu
DestroyIcon
GetWindowTextW
IsWindowVisible
GetDlgItemTextW
ReleaseDC
GetMonitorInfoW
CreateWindowExW
SetForegroundWindow
DispatchMessageW
LoadCursorW
ShowWindow
IsWindow
kernel32
GetCPInfo
RtlUnwind
GetStdHandle
UnhandledExceptionFilter
HeapDestroy
GetModuleFileNameA
CompareStringA
DeleteCriticalSection
Sleep
WaitForSingleObject
GetConsoleMode
GetStartupInfoA
SetEnvironmentVariableA
LocalFree
CloseHandle
LCMapStringW
SetStdHandle
FatalAppExitA
IsValidCodePage
VirtualAlloc
InterlockedIncrement
GetTickCount
GetModuleFileNameW
GetTimeZoneInformation
GetOEMCP
ReadFile
EnterCriticalSection
MultiByteToWideChar
TlsSetValue
GetLastError
InterlockedDecrement
TlsGetValue
GetLocaleInfoA
GetCommandLineW
CreateMutexW
CreateFileA
GetConsoleOutputCP
GetLocaleInfoW
TlsAlloc
GetUserDefaultLCID
GetStartupInfoW
HeapAlloc
TerminateProcess
HeapCreate
GetCurrentProcessId
GetConsoleCP
GetStringTypeA
HeapFree
WideCharToMultiByte
VirtualQuery
GetEnvironmentStringsW
WriteConsoleA
GetDateFormatA
GetStringTypeW
HeapSize
GetModuleHandleW
FreeEnvironmentStringsW
GetProcAddress
IsDebuggerPresent
LCMapStringA
RaiseException
CompareStringW
GetCurrentThreadId
GetACP
GetFileType
HeapReAlloc
SetHandleCount
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
FlushFileBuffers
LeaveCriticalSection
LoadLibraryA
GetModuleHandleA
IsValidLocale
WriteConsoleW
GetCurrentThread
GetSystemTimeAsFileTime
ExitProcess
FreeLibrary
SetLastError
InterlockedExchange
TlsFree
WriteFile
SetFilePointer
SetConsoleCtrlHandler
GetCurrentProcess
QueryPerformanceCounter
GetTimeFormatA
VirtualFree
comctl32
ImageList_Destroy
CreatePropertySheetPageW
ImageList_Create
PropertySheetW
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 453KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ