Static task
static1
Behavioral task
behavioral1
Sample
e9cb5b1a2d2cc31dccd476fceec7786eb85671dc0f3c508917d870e43a2b84c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9cb5b1a2d2cc31dccd476fceec7786eb85671dc0f3c508917d870e43a2b84c4.exe
Resource
win10v2004-20220812-en
General
-
Target
e9cb5b1a2d2cc31dccd476fceec7786eb85671dc0f3c508917d870e43a2b84c4
-
Size
724KB
-
MD5
0735a2c296818b2d7c713a45cdec4c36
-
SHA1
b4ab071d4543401e0f8ec0ee44714a13d9af6f34
-
SHA256
e9cb5b1a2d2cc31dccd476fceec7786eb85671dc0f3c508917d870e43a2b84c4
-
SHA512
51f51c72f8f6f4e02e3cbf52c9dcd4e98ad7fc474df58615c77b6a9f3ec1feb9aa5f462ccadd7a6e7124934c2f61cfad8d60b38db5e112190ea56df4a6cb7801
-
SSDEEP
12288:u3+nl9uzLC5ujsdP6PN3ymaiWcYVmVgGMLdaSNLbWenjmuR0yZLP2+8AYBv5+Uc4:PnldKk6hmcYVmuGM36TuR0QP8AYYUN
Malware Config
Signatures
Files
-
e9cb5b1a2d2cc31dccd476fceec7786eb85671dc0f3c508917d870e43a2b84c4.exe windows x86
1d2fcba58982c3df2259ce32fa77d875
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
FindExecutableA
SHInvokePrinterCommandW
SHGetFileInfo
SHAppBarMessage
user32
DdeNameService
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
GetKeyboardLayoutNameW
RegisterClassExA
DialogBoxIndirectParamA
DlgDirListComboBoxW
EnumWindows
SwapMouseButton
GetKeyNameTextW
ArrangeIconicWindows
CharUpperBuffA
MapWindowPoints
DdeCmpStringHandles
RegisterClassA
comctl32
InitCommonControlsEx
advapi32
RegSetValueExW
CryptDecrypt
RevertToSelf
RegLoadKeyA
CryptReleaseContext
LookupAccountNameA
CryptAcquireContextW
RegDeleteValueA
CryptSetProviderW
RegQueryInfoKeyW
RegCreateKeyA
RegLoadKeyW
CryptGenKey
RegQueryValueExW
CryptEncrypt
LookupPrivilegeValueA
CryptDestroyHash
CryptSetKeyParam
RegSetValueExA
RegEnumValueA
RegSetValueW
CryptVerifySignatureW
AbortSystemShutdownW
RegEnumKeyExW
kernel32
GetStdHandle
GetTempFileNameA
ExitProcess
TerminateProcess
LoadLibraryW
GetEnvironmentStrings
GetModuleHandleW
HeapValidate
WriteConsoleW
FreeLibrary
GetProcessAffinityMask
OutputDebugStringW
IsBadReadPtr
VirtualFree
QueryPerformanceCounter
GetACP
OpenFileMappingA
EnumSystemLocalesA
DebugBreak
LCMapStringW
GetUserDefaultLCID
RtlUnwind
InterlockedIncrement
GetCurrentThread
DeleteCriticalSection
GetModuleHandleA
TlsAlloc
WideCharToMultiByte
SetConsoleCtrlHandler
GetCommandLineA
GetStringTypeW
GetLocaleInfoW
TlsSetValue
CompareStringW
HeapReAlloc
GetEnvironmentStringsW
Sleep
HeapCreate
GetModuleFileNameW
InterlockedExchange
UnhandledExceptionFilter
GetProcessHeap
IsValidLocale
SetEnvironmentVariableA
VirtualAlloc
TlsGetValue
FreeEnvironmentStringsA
SetComputerNameW
GetDateFormatA
ReadFile
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetStartupInfoA
ResetEvent
GetSystemTimeAsFileTime
LoadLibraryA
SetLastError
CompareStringA
GetStringTypeA
CreateMutexA
GetLastError
LocalFree
SetFilePointer
FlushFileBuffers
HeapAlloc
OpenFile
VirtualQuery
OutputDebugStringA
GetConsoleCP
IsDebuggerPresent
RaiseException
WriteFile
CreateFileA
GetConsoleMode
GetLocaleInfoA
GetTimeFormatA
GetTickCount
LCMapStringA
GetProcAddress
GetConsoleOutputCP
HeapFree
lstrlenA
TlsFree
OpenMutexA
GetFileType
GetCPInfo
GetCurrentProcessId
GetSystemDirectoryW
FreeEnvironmentStringsW
EnterCriticalSection
IsValidCodePage
InterlockedDecrement
GetOEMCP
GetCurrentProcess
GetTimeZoneInformation
WriteConsoleA
CompareFileTime
GetModuleFileNameA
SetUnhandledExceptionFilter
MultiByteToWideChar
HeapDestroy
HeapSize
CloseHandle
SetHandleCount
LeaveCriticalSection
WritePrivateProfileStructA
GetCurrentThreadId
comdlg32
PageSetupDlgW
PrintDlgA
ChooseFontA
wininet
FindFirstUrlCacheEntryExA
DeleteUrlCacheGroup
InternetWriteFileExA
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ