Static task
static1
Behavioral task
behavioral1
Sample
e4e73a3a8250a46ea7661abf33d2a30a39a56681a863115403c0fe1d4cf7648b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4e73a3a8250a46ea7661abf33d2a30a39a56681a863115403c0fe1d4cf7648b.exe
Resource
win10v2004-20220901-en
General
-
Target
e4e73a3a8250a46ea7661abf33d2a30a39a56681a863115403c0fe1d4cf7648b
-
Size
344KB
-
MD5
04cb4f2f3429f1b07d34a4b150bea7b9
-
SHA1
3eb025e41e1836b00ecd1ae4fc93ac45281436ff
-
SHA256
e4e73a3a8250a46ea7661abf33d2a30a39a56681a863115403c0fe1d4cf7648b
-
SHA512
d320786472c2b76b31da060d2c96393c0400cc6103eb7070dd102cc22cc60dc5520d52e375a4708bdcf50ce65fcfa1928b604691d4c425756a234cd6ab72416f
-
SSDEEP
6144:Jjx5Db3kRq2ZSaq/tkzBBoZTPK5tlxZWSVrfNLwYQQQULQQU6:r5DLMhMGLWPGZWk1LvQQQULQQU6
Malware Config
Signatures
Files
-
e4e73a3a8250a46ea7661abf33d2a30a39a56681a863115403c0fe1d4cf7648b.exe windows x86
9728867b55d018cf84e124690ec3265d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptEncrypt
LookupSecurityDescriptorPartsW
CryptGetDefaultProviderA
RegEnumKeyExA
LookupAccountNameA
RegConnectRegistryA
DuplicateTokenEx
user32
GetSubMenu
BroadcastSystemMessageW
CreateMDIWindowA
ScrollWindow
GetMonitorInfoA
DefWindowProcW
DdeAddData
LoadCursorW
GetWindowInfo
GetProcessDefaultLayout
IsCharAlphaNumericA
ShowWindowAsync
RegisterDeviceNotificationW
DestroyWindow
DlgDirListComboBoxA
OemKeyScan
CreateDialogParamW
ArrangeIconicWindows
DefMDIChildProcW
IsIconic
ChildWindowFromPointEx
CreateWindowExA
SetWindowLongA
DdeClientTransaction
MessageBoxA
IsDialogMessageA
ChangeMenuA
SetClipboardData
OpenWindowStationA
SetProcessWindowStation
DdePostAdvise
RegisterClassA
GetWindowContextHelpId
DrawFrame
GetDlgItemInt
MapDialogRect
SetUserObjectInformationA
GetSystemMenu
FillRect
RegisterClassExA
ShowWindow
LoadImageA
SetPropW
GetSysColorBrush
GetCursorInfo
GetWindowPlacement
comctl32
ImageList_SetImageCount
CreateToolbarEx
InitCommonControlsEx
DrawStatusTextW
kernel32
GetDateFormatA
SetEnvironmentVariableA
GetTimeFormatA
CompareFileTime
GetLocaleInfoW
RemoveDirectoryA
SetThreadLocale
Sleep
GetLocaleInfoA
RtlUnwind
GetEnvironmentStringsW
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetConsoleCP
SetUnhandledExceptionFilter
EnterCriticalSection
HeapCreate
TlsSetValue
GetStdHandle
GetCurrentDirectoryW
UnmapViewOfFile
GetEnvironmentStrings
ExitProcess
GetProcessHeap
GetLastError
LeaveCriticalSection
EnumResourceNamesA
VirtualAllocEx
SetCriticalSectionSpinCount
DeleteCriticalSection
LoadLibraryExW
CreatePipe
TerminateProcess
InterlockedDecrement
GetEnvironmentVariableA
CloseHandle
CreateMutexA
CreateFileA
GetConsoleMode
GetOEMCP
GetThreadLocale
FreeEnvironmentStringsW
GetStringTypeA
SetWaitableTimer
GetNamedPipeHandleStateA
SetFilePointer
GetDiskFreeSpaceExW
GetDiskFreeSpaceA
MultiByteToWideChar
HeapAlloc
GetTimeZoneInformation
SetConsoleOutputCP
GetCurrentThread
WriteConsoleA
SetSystemTime
GetACP
lstrcat
TlsGetValue
WaitForSingleObject
OpenEventW
GetConsoleOutputCP
GlobalAddAtomW
GetModuleFileNameW
VirtualQuery
GetProcAddress
GetSystemDefaultLangID
WaitForMultipleObjects
FoldStringW
IsValidCodePage
HeapDestroy
GetCurrentProcessId
GetStartupInfoA
FindNextChangeNotification
GetLogicalDriveStringsW
SetStdHandle
LCMapStringA
GetStartupInfoW
GetFileType
SetCurrentDirectoryW
GetSystemTimeAdjustment
CreateRemoteThread
CopyFileA
WriteConsoleW
LoadLibraryA
WideCharToMultiByte
TlsFree
GetProcAddress
GetMailslotInfo
FormatMessageA
UnhandledExceptionFilter
GetConsoleScreenBufferInfo
ReadFile
CompareStringA
HeapFree
IsDebuggerPresent
GlobalUnlock
VirtualFree
OpenWaitableTimerA
InterlockedExchange
FillConsoleOutputAttribute
GetVersionExA
QueryPerformanceCounter
GetStringTypeW
GetCommandLineW
GetPrivateProfileSectionNamesA
WritePrivateProfileStructA
DeleteFiber
LCMapStringW
WaitForSingleObjectEx
GetCommandLineA
GlobalAddAtomA
CompareStringW
SetLastError
GetCPInfo
FlushFileBuffers
lstrlenW
GetFileTime
TlsAlloc
ConnectNamedPipe
GetSystemDirectoryW
WaitNamedPipeA
HeapSize
GetProfileStringA
InterlockedIncrement
WriteFile
SetConsoleCtrlHandler
GetLongPathNameW
FreeLibrary
GetModuleFileNameA
HeapReAlloc
IsValidLocale
OpenMutexA
WriteConsoleInputW
InitializeCriticalSection
GetCurrentProcess
SetConsoleTextAttribute
ReleaseSemaphore
GetCurrentThreadId
HeapLock
VirtualAlloc
ReadConsoleOutputCharacterA
EnumSystemLocalesA
GetTickCount
GetModuleHandleA
FreeEnvironmentStringsA
SetHandleCount
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ