Static task
static1
Behavioral task
behavioral1
Sample
e72034cf643a4ee381d46a471a9b3e8f8645bd49f4c1df42576b25fd748fa8b2.exe
Resource
win7-20220901-en
General
-
Target
e72034cf643a4ee381d46a471a9b3e8f8645bd49f4c1df42576b25fd748fa8b2
-
Size
114KB
-
MD5
08628bfa0159383f4982ffc073e24be0
-
SHA1
5ec09ae710090843b9188f78f425c581915455b8
-
SHA256
e72034cf643a4ee381d46a471a9b3e8f8645bd49f4c1df42576b25fd748fa8b2
-
SHA512
2d67656e492455d5d08774ef4ab59b5bb2b2810dd714c6be986a070502fe05cf9f90a827a147bc64844d1c161006cfaacad79c0ab65cb0f8459adf0ee3d4996e
-
SSDEEP
1536:faaJSg35DF985y7Jns3g80wDh3czF7YqWbOKnSUwtw8MK+LtQhI9aWnsSbMc:tF78ks3t0wDh3GZIp3KJmMVSbMc
Malware Config
Signatures
Files
-
e72034cf643a4ee381d46a471a9b3e8f8645bd49f4c1df42576b25fd748fa8b2.exe windows x86
0d6e692aa1463f329a38a8aaa052b69b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetCurrentThread
SetThreadPriority
TerminateThread
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
GetSystemPowerStatus
FreeLibrary
GetProcAddress
LoadLibraryA
CreateFileA
CreateFileW
FindClose
FindFirstFileA
FindNextFileA
GetFileAttributesA
GetFinalPathNameByHandleW
ReadFile
CreateEventA
GetCurrentProcess
GetSystemInfo
VirtualQueryEx
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
MultiByteToWideChar
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
WideCharToMultiByte
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetFilePointer
CloseHandle
user32
LoadIconA
GetMessageA
CreateWindowExA
DestroyWindow
SetTimer
KillTimer
FindWindowA
LoadCursorA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
advapi32
CloseServiceHandle
OpenServiceA
QueryServiceStatus
RegCloseKey
RegOpenKeyA
RegQueryValueA
OpenSCManagerA
shell32
SHGetKnownFolderPath
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
msvcp120
?_Syserror_map@std@@YAPBDH@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
msvcr120
_crt_debugger_hook
_acmdln
_initterm
__crtUnhandledException
_initterm_e
__setusermatherr
_commode
__crtTerminateProcess
__crtSetUnhandledExceptionFilter
_invoke_watson
_controlfp_s
_except_handler4_common
_calloc_crt
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
strrchr
strstr
malloc
_CxxThrowException
__CxxFrameHandler3
memcpy
memset
strchr
??_V@YAXPAX@Z
free
_lock
_unlock
_configthreadlocale
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_XcptFilter
__crtGetShowWindowMode
_amsg_exit
__getmainargs
__set_app_type
exit
_exit
_cexit
_ismbblead
_fmode
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE