Static task
static1
Behavioral task
behavioral1
Sample
e503f851300c9cadc792ebc9f6c3c494ef8a20b0d6f3e8ee18683d83df337714.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e503f851300c9cadc792ebc9f6c3c494ef8a20b0d6f3e8ee18683d83df337714.exe
Resource
win10v2004-20220812-en
General
-
Target
e503f851300c9cadc792ebc9f6c3c494ef8a20b0d6f3e8ee18683d83df337714
-
Size
468KB
-
MD5
0f6ab8b5d1fa25d73edbce89d52bb16c
-
SHA1
1a868603cbc1b06afd698039e7d3476ef0bff5a4
-
SHA256
e503f851300c9cadc792ebc9f6c3c494ef8a20b0d6f3e8ee18683d83df337714
-
SHA512
ba2812b03e5bfdf65de37c671dc7474d631fdd8d26e906e8d69d8564236c6356203b1a7823df2beaf99a15fa388add4eb8804eb195ccf9092fc8131a2ac9e9c8
-
SSDEEP
6144:3oyOHM0mKgC3GgYSCn+YOSR0HVhRgiUzP9+DKwOPOP4aAXeCUhBR/Fextu9XC:43MJKgOGyCnqj09+DKwYOseCm8xq
Malware Config
Signatures
Files
-
e503f851300c9cadc792ebc9f6c3c494ef8a20b0d6f3e8ee18683d83df337714.exe windows x86
4e092a751941b02bba14e213ff2ada73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ord155
SHGetMalloc
ExtractIconW
ShellExecuteExW
user32
LockWindowUpdate
FillRect
InvalidateRect
AppendMenuA
TranslateMessage
IsDialogMessageA
LoadStringA
LoadBitmapA
SetRectEmpty
CreatePopupMenu
PostMessageA
DefWindowProcA
EnableMenuItem
EnableWindow
SetWindowLongA
RegisterClassExA
CheckMenuItem
SetMenuDefaultItem
SetWindowTextA
GetClassNameA
GetClientRect
DeferWindowPos
DestroyMenu
DestroyCaret
CopyRect
GetKeyState
GetDlgItemTextA
BeginDeferWindowPos
InsertMenuItemA
MapWindowPoints
DestroyWindow
SetFocus
EndDeferWindowPos
GetMenuState
GetWindowDC
DestroyIcon
InflateRect
IsWindowVisible
GetMessagePos
GetSystemMetrics
CreateMenu
LoadCursorA
DrawMenuBar
LoadIconA
GrayStringA
SetDlgItemTextA
InsertMenuA
DrawFocusRect
GetWindow
EmptyClipboard
SetParent
SetRect
RegisterClassA
GetScrollPos
KillTimer
GetFocus
GetWindowThreadProcessId
GetForegroundWindow
IsWindowEnabled
GetWindowRect
GetDlgItem
GetParent
ShowCaret
DispatchMessageA
OffsetRect
kernel32
SetEnvironmentVariableA
FlushFileBuffers
SetThreadPriority
ResumeThread
TerminateProcess
GetStringTypeExA
VirtualAlloc
GetEnvironmentStringsW
lstrcmpA
VirtualFree
LockFile
WaitForSingleObject
lstrlenW
GlobalFree
GetFileSize
LCMapStringW
GetSystemTimeAsFileTime
GetLocalTime
GetCurrentThread
VirtualProtect
CreateThread
ExitProcess
HeapCreate
GetModuleFileNameA
GlobalAlloc
FindNextFileA
RaiseException
GetPrivateProfileStringA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
CloseHandle
InterlockedExchange
FreeEnvironmentStringsA
GetProcAddress
FindFirstFileA
LocalReAlloc
TlsGetValue
DeviceIoControl
HeapDestroy
SetUnhandledExceptionFilter
InterlockedDecrement
GlobalFindAtomA
IsBadCodePtr
GetStartupInfoA
ReadFile
CompareStringW
GetStringTypeW
GetTickCount
SetStdHandle
GetCommandLineA
GetACP
InitializeCriticalSection
GetLocaleInfoA
DeleteCriticalSection
QueryPerformanceCounter
HeapReAlloc
UnhandledExceptionFilter
GlobalUnlock
SetLastError
GetEnvironmentStrings
GetOEMCP
LeaveCriticalSection
GetTempFileNameA
CreateMutexA
HeapAlloc
HeapSize
FreeEnvironmentStringsW
RtlUnwind
SetFilePointer
GetCPInfo
WideCharToMultiByte
InterlockedIncrement
GetModuleFileNameW
GetFullPathNameA
GetWindowsDirectoryA
FindClose
DeleteFileA
GlobalLock
GetModuleHandleA
GetFileType
ConvertDefaultLocale
UnlockFile
LCMapStringA
GetLastError
TlsAlloc
CompareStringA
GetFileAttributesA
GetCurrentProcess
GetVersion
VirtualQuery
ExitThread
GetCurrentThreadId
GetTimeZoneInformation
lstrlenA
HeapFree
GetStdHandle
WriteFile
MultiByteToWideChar
GlobalAddAtomA
GetStringTypeA
SetHandleCount
SizeofResource
TlsFree
GetCurrentProcessId
GetSystemTime
FormatMessageA
GetSystemDirectoryA
SetEndOfFile
LoadLibraryA
FreeResource
TlsSetValue
GlobalReAlloc
EnterCriticalSection
gdi32
GetTextFaceA
GetDIBits
SetWindowOrgEx
StartDocA
SetRectRgn
CreateFontA
SelectPalette
SetViewportExtEx
GetDeviceCaps
CombineRgn
GetBkColor
DeleteObject
DeleteDC
GetObjectA
CreateDCA
ole32
OleUninitialize
OleLockRunning
StgOpenStorageOnILockBytes
CreateFileMoniker
OleInitialize
OleFlushClipboard
CLSIDFromProgID
OleQueryLinkFromData
OleSetContainedObject
OleGetClipboard
CreateGenericComposite
CoRevokeClassObject
DoDragDrop
OleQueryCreateFromData
CoTaskMemAlloc
WriteClassStg
CoDisconnectObject
CLSIDFromString
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ