Static task
static1
Behavioral task
behavioral1
Sample
e0cb91fd8b43030c119b5c39a4ee5efda28fb99ca8fbb25d9e0683e0d79765d7.exe
Resource
win7-20220901-en
General
-
Target
e0cb91fd8b43030c119b5c39a4ee5efda28fb99ca8fbb25d9e0683e0d79765d7
-
Size
285KB
-
MD5
130de51689ac60119bd3ab5fc79bf4c2
-
SHA1
b08740efc01ebf629e1834e410dc3f3477cdcc4d
-
SHA256
e0cb91fd8b43030c119b5c39a4ee5efda28fb99ca8fbb25d9e0683e0d79765d7
-
SHA512
cda491b6c08e99c944111d3fee3c2ba65550670c94fa01a0dd08d25069ce3bc9193fa8b759c3c5ef24a26e91f5b84368d4353782a4d775a14b915b38d2abf537
-
SSDEEP
6144:SnrX/QX6DGCCt6UGEKc3J3dKxTMgcbgWRo8AKf7uUV05h:K/QXPaEh3J3dCqUYo8AKf7ti5h
Malware Config
Signatures
Files
-
e0cb91fd8b43030c119b5c39a4ee5efda28fb99ca8fbb25d9e0683e0d79765d7.exe windows x86
3a90c377ff7ef1e1ba5a409f5136465a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrcpyA
GetModuleFileNameA
SetFilePointer
lstrcmpA
HeapFree
HeapAlloc
GetProcessHeap
CopyFileA
WaitForSingleObject
CreateProcessA
GetVersionExA
GetCurrentProcess
GetDriveTypeA
GetLogicalDriveStringsA
FindNextFileA
FindClose
FindFirstFileA
RemoveDirectoryA
CreateDirectoryA
lstrcpynA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
SetFileAttributesA
GetFileAttributesA
GetShortPathNameA
GetCurrentDirectoryA
WritePrivateProfileStringA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
GetWindowsDirectoryA
MoveFileExA
OpenProcess
CreateMutexA
Sleep
ReadFile
GetFileSize
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetStringTypeW
GetStringTypeA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetLastError
GetSystemDirectoryA
CreateFileA
lstrlenA
WriteFile
SetCurrentDirectoryA
GetTempPathA
DeleteFileA
LoadLibraryA
CloseHandle
GetCurrentProcessId
FreeLibrary
user32
DialogBoxParamA
SetDlgItemTextA
EnableWindow
wsprintfA
LoadStringA
EndDialog
ExitWindowsEx
MessageBoxA
SystemParametersInfoA
GetWindowRect
MoveWindow
FindWindowA
IsDlgButtonChecked
GetSystemMenu
DeleteMenu
DrawMenuBar
KillTimer
GetDlgItemTextA
SendMessageA
CharUpperA
DefWindowProcA
BringWindowToTop
SetActiveWindow
SetFocus
GetDlgItem
ShowWindow
PostMessageA
advapi32
AdjustTokenPrivileges
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetFileInfoA
SHChangeNotify
ole32
CoCreateInstance
CoUninitialize
CoInitialize
lz32
GetExpandedNameA
LZClose
LZCopy
LZOpenFileA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
setupapi
SetupIterateCabinetA
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE