Static task
static1
Behavioral task
behavioral1
Sample
e8a30f983917037647f52d7521b63119293268c7a943b78073c2458445deb356.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8a30f983917037647f52d7521b63119293268c7a943b78073c2458445deb356.exe
Resource
win10v2004-20220812-en
General
-
Target
e8a30f983917037647f52d7521b63119293268c7a943b78073c2458445deb356
-
Size
756KB
-
MD5
016cb6624ab123c1784e8c88403b8c7e
-
SHA1
c5d9927531ff64dca5fa657aa601c1b2e6865359
-
SHA256
e8a30f983917037647f52d7521b63119293268c7a943b78073c2458445deb356
-
SHA512
7eb083948fc0cc59233856cbc047a7b57824eb12277741340bd13f2be704723ce8be17ce9f92f9bd30f7258489c8b280b495e421843f9659c6583e7063a05700
-
SSDEEP
12288:6NtOyp7erPbmYwXtdd57viP8xgA2EcS+V2x9UkOuGvi0TFnkA2Sb7:4OyQmHtL57vG86As924kk/TFV2
Malware Config
Signatures
Files
-
e8a30f983917037647f52d7521b63119293268c7a943b78073c2458445deb356.exe windows x86
1dc51806a5d7a44f3f0d3da8bbfb389b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStretchBltMode
GetBitmapDimensionEx
GetPixel
DeleteDC
RectInRegion
GetWindowExtEx
AbortDoc
OffsetRgn
Rectangle
GetBkMode
LineTo
CreateDCA
GetCharABCWidthsA
Chord
GetBitmapBits
SetBitmapDimensionEx
GetNearestColor
MoveToEx
SetROP2
OffsetClipRgn
SetBkColor
GetObjectA
RoundRect
StrokeAndFillPath
DeleteObject
GetTextFaceA
GetStockObject
ResizePalette
GetDeviceCaps
GetPolyFillMode
SetBoundsRect
GetGlyphOutlineA
CreatePen
comdlg32
CommDlgExtendedError
PrintDlgA
GetSaveFileNameA
GetOpenFileNameA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
user32
DrawIcon
SetFocus
TabbedTextOutA
DrawFocusRect
GetDesktopWindow
ExitWindowsEx
GetDC
UnhookWindowsHookEx
PostMessageA
UnregisterClassA
GetWindowTextA
SetWindowTextA
RegisterClassExA
CreateCaret
OpenClipboard
GetSystemMetrics
DestroyCursor
GetDCEx
GetDlgItem
InflateRect
KillTimer
LoadImageA
CreatePopupMenu
IsDlgButtonChecked
CallWindowProcA
CreateWindowExA
DestroyAcceleratorTable
SetScrollPos
GetMenu
TrackPopupMenu
ValidateRect
ShowWindow
RegisterClassA
MessageBoxA
PtInRect
MoveWindow
RedrawWindow
GetDlgCtrlID
PeekMessageA
CopyRect
MapWindowPoints
AppendMenuA
FillRect
SetWindowRgn
RemovePropA
EnumWindows
AttachThreadInput
EnableWindow
CreateIconIndirect
SetActiveWindow
ClientToScreen
DrawFrameControl
ScrollWindow
SetRectEmpty
GetWindowRect
GetLastActivePopup
ReleaseCapture
SystemParametersInfoA
PostQuitMessage
SetCaretPos
SetCapture
SetWindowsHookExA
GetSysColorBrush
LoadCursorA
InvertRect
TranslateMessage
DefWindowProcA
DestroyWindow
EnableMenuItem
SetWindowPos
kernel32
SetThreadPriority
FindFirstFileA
WriteConsoleA
GlobalSize
GetStdHandle
HeapReAlloc
SizeofResource
lstrcmpA
lstrcmpiW
WideCharToMultiByte
CreateProcessW
lstrcpyW
GetCPInfo
RaiseException
EnterCriticalSection
TlsSetValue
GetTempFileNameA
Sleep
GetConsoleMode
FileTimeToLocalFileTime
CreateProcessA
IsBadWritePtr
UnlockFile
FlushInstructionCache
GetVersion
GetProcessHeap
MultiByteToWideChar
SetHandleCount
GetProcAddress
GlobalDeleteAtom
GetDriveTypeA
CloseHandle
FatalAppExitA
HeapDestroy
FreeEnvironmentStringsW
FindNextFileW
HeapFree
SetEnvironmentVariableA
GetACP
LocalFileTimeToFileTime
lstrcmpW
GetStartupInfoA
lstrcpynW
RtlUnwind
CompareStringA
SetFileAttributesA
FindClose
lstrcpynA
CreateDirectoryA
VirtualFree
FlushFileBuffers
GetSystemTime
SetEndOfFile
DuplicateHandle
GetFileType
FormatMessageA
WriteFile
GlobalHandle
HeapSize
FreeLibrary
GlobalAlloc
LocalFree
UnhandledExceptionFilter
GlobalFree
GetLocaleInfoW
LoadLibraryA
GetStringTypeA
GetEnvironmentStringsW
DeleteCriticalSection
ExitThread
FreeEnvironmentStringsA
GlobalFlags
TlsFree
GetCurrentDirectoryA
IsValidLocale
MoveFileW
SuspendThread
LockFile
FreeResource
GlobalUnlock
SetStdHandle
SetFilePointer
InterlockedExchange
GetUserDefaultLCID
GetSystemTimeAsFileTime
TlsAlloc
GetSystemDirectoryA
SetConsoleCtrlHandler
QueryPerformanceCounter
LocalAlloc
VirtualAlloc
CreateFileW
CopyFileA
GetTimeFormatA
GetStringTypeW
OutputDebugStringA
ExitProcess
GetExitCodeProcess
SetErrorMode
lstrcmpiA
GetCommandLineA
InterlockedIncrement
IsDebuggerPresent
MulDiv
MapViewOfFile
GetSystemInfo
GetCurrentProcess
WaitForSingleObject
CreateMutexA
GetModuleHandleA
GetFileSize
GlobalReAlloc
CreateFileA
EnumSystemLocalesA
GetEnvironmentStrings
GetTickCount
lstrlenW
GetThreadLocale
GlobalLock
SetUnhandledExceptionFilter
FindNextFileA
LockResource
lstrlenA
GetTempPathW
VirtualQuery
GetOEMCP
DeleteFileW
IsValidCodePage
GetCurrentThread
GetLastError
GetFileTime
FileTimeToSystemTime
ReadFile
LCMapStringA
GetModuleFileNameA
GetLocaleInfoA
LoadResource
LCMapStringW
CompareStringW
GetDateFormatA
FindFirstFileW
LeaveCriticalSection
GetFullPathNameW
TlsGetValue
FormatMessageW
GetLocalTime
SetLastError
CreateThread
HeapAlloc
GetCurrentThreadId
TerminateProcess
HeapCreate
UnmapViewOfFile
GetFileAttributesA
SystemTimeToFileTime
GetTimeZoneInformation
LocalReAlloc
GetCurrentProcessId
InitializeCriticalSection
GetVersionExA
SetEvent
InterlockedDecrement
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 444KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ