Static task
static1
Behavioral task
behavioral1
Sample
e688e311795948fea83635a792e30a8bd7847dda44b8ccb60d5528cc785bce60.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e688e311795948fea83635a792e30a8bd7847dda44b8ccb60d5528cc785bce60.exe
Resource
win10v2004-20220901-en
General
-
Target
e688e311795948fea83635a792e30a8bd7847dda44b8ccb60d5528cc785bce60
-
Size
464KB
-
MD5
f87aa1d7556bfd43dbf7266c3937211f
-
SHA1
be20b0fd84278c933fcf2f33ada57939de9ecaac
-
SHA256
e688e311795948fea83635a792e30a8bd7847dda44b8ccb60d5528cc785bce60
-
SHA512
303d2e43a490a8bcf52cac25b8fc241b3fae1f551343c4a00d441a2d6b1bb3bb2c11ae78901e48a2780561b3ba26fd4d05bde9e09c2c97c60c56884bb80feecd
-
SSDEEP
6144:Bo9DtO+n0/z8GUlsFGsjy1r1ZMSbGXd+/RfFd34cNbuc4fcCyPWu++YgGFYOeN:cDo+2K5ZpUUfFdVCXPSRN
Malware Config
Signatures
Files
-
e688e311795948fea83635a792e30a8bd7847dda44b8ccb60d5528cc785bce60.exe windows x86
799a1dbda1976862b50a5c18753c30fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
RtlUnwind
GetSystemDefaultLCID
GetPrivateProfileIntW
LockFileEx
GetVolumePathNameA
GetWriteWatch
TlsSetValue
GetVolumeInformationW
WaitNamedPipeA
CreateFileW
LCMapStringW
RemoveDirectoryA
GetExitCodeProcess
SetCalendarInfoW
SetThreadIdealProcessor
GetCommProperties
FoldStringW
GetComputerNameA
GlobalHandle
SetMessageWaitingIndicator
GetProcessHeap
GetDiskFreeSpaceExW
SetThreadPriorityBoost
FoldStringA
FileTimeToSystemTime
_lread
lstrcpyA
WaitForDebugEvent
FileTimeToLocalFileTime
LockFile
FreeEnvironmentStringsW
_hread
GetPriorityClass
DefineDosDeviceA
CallNamedPipeW
OpenFile
DeleteAtom
GetDateFormatW
UnhandledExceptionFilter
LocalLock
CreateEventW
CreateJobObjectW
WaitNamedPipeW
GetVolumeNameForVolumeMountPointA
Process32FirstW
CreateWaitableTimerW
GetProfileStringW
GetCurrencyFormatW
FlushInstructionCache
SetCalendarInfoA
WaitForSingleObject
MulDiv
OpenWaitableTimerW
SetVolumeMountPointW
DuplicateHandle
CommConfigDialogA
ReadFileScatter
FlushFileBuffers
GetVolumePathNameW
GetTempFileNameW
InitAtomTable
LocalReAlloc
FindNextVolumeA
OpenSemaphoreA
GetShortPathNameW
IsBadHugeWritePtr
CommConfigDialogW
GetTimeFormatW
LocalFileTimeToFileTime
CreateHardLinkW
FindClose
GetThreadTimes
RemoveDirectoryW
GetTickCount
GetFileTime
DebugActiveProcess
WritePrivateProfileSectionW
SleepEx
MoveFileExA
GetCurrentProcess
GetSystemInfo
SetFileApisToANSI
GetFileAttributesExW
GetTempPathW
_lcreat
SignalObjectAndWait
GetStringTypeW
SetThreadPriority
SetSystemPowerState
RtlZeroMemory
PostQueuedCompletionStatus
DefineDosDeviceW
SetHandleInformation
GetSystemTimeAdjustment
GetCalendarInfoA
GetCompressedFileSizeA
GlobalFree
lstrcpyW
SetTimerQueueTimer
DnsHostnameToComputerNameA
GlobalFix
FatalAppExitW
CreateDirectoryExW
GetPrivateProfileStructW
LocalSize
FindFirstFileW
BindIoCompletionCallback
GetDriveTypeW
UpdateResourceA
GetLongPathNameA
QueueUserWorkItem
FlushViewOfFile
GetThreadContext
GetVolumeInformationA
GetSystemDefaultUILanguage
CreateDirectoryW
MoveFileExW
EnumResourceLanguagesW
GetSystemWindowsDirectoryA
GetSystemPowerStatus
SetFilePointerEx
EscapeCommFunction
GetCommTimeouts
GetCurrentProcessId
GetTempPathA
SetMailslotInfo
GetTempFileNameA
SetLocalTime
SetSystemTime
shlwapi
PathAppendA
user32
DdeInitializeW
GetProcessWindowStation
InvalidateRgn
DragObject
EnumPropsA
AttachThreadInput
GetProcessDefaultLayout
FindWindowA
CharUpperBuffA
MessageBoxIndirectA
GetDlgItemTextA
DefFrameProcW
CharLowerBuffW
DefWindowProcA
DdeEnableCallback
SetCursor
IntersectRect
DrawIcon
GetWindowRect
GetPriorityClipboardFormat
GetDlgItem
EnableWindow
GetKeyboardLayoutNameW
ArrangeIconicWindows
DestroyCursor
GetKBCodePage
IsDlgButtonChecked
DeferWindowPos
GetMouseMovePointsEx
GetSystemMetrics
MenuItemFromPoint
ChangeClipboardChain
MapWindowPoints
TranslateMessage
IsDialogMessageA
GetLastInputInfo
EnableScrollBar
GetListBoxInfo
DdeGetData
RegisterClipboardFormatA
MsgWaitForMultipleObjects
PostQuitMessage
SetCaretPos
SetUserObjectSecurity
CloseDesktop
GetAltTabInfoA
ScrollDC
DrawMenuBar
CharNextA
CharNextExA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 181KB - Virtual size: 481KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ