Static task
static1
Behavioral task
behavioral1
Sample
e0c3c7131e2f24a6f010938bc25b1dc54a8b888ab5b39cfaf1b864a01294d902.exe
Resource
win7-20220812-en
General
-
Target
e0c3c7131e2f24a6f010938bc25b1dc54a8b888ab5b39cfaf1b864a01294d902
-
Size
700KB
-
MD5
a062a4782ea67e8ef3b3336286a9d741
-
SHA1
a486bed438443815ffd7b6c26099161052fa7992
-
SHA256
e0c3c7131e2f24a6f010938bc25b1dc54a8b888ab5b39cfaf1b864a01294d902
-
SHA512
c26288872361d9babc41a906b9d7ac086b55e449980ed2eb9d3ec79185c18931dfc364265504d84b32e767e8b6ef2e7f4e19ec8be637efc2a4e6f7f7a4b4b890
-
SSDEEP
12288:IPaPUnR65Sa44S5zJKWdGGIBOX7LzuWLGAOB0BIbdwVrGXOgBgNjb:IPamUOKMGdBu3sAA+gdaKXBM
Malware Config
Signatures
Files
-
e0c3c7131e2f24a6f010938bc25b1dc54a8b888ab5b39cfaf1b864a01294d902.exe windows x86
ecb8847541f7b581d53ea327ac518a67
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadExecutionState
LockFile
GetDevicePowerState
GlobalFree
InterlockedCompareExchange
GetSystemDefaultUILanguage
GetFileAttributesExA
GetPrivateProfileSectionA
SetCalendarInfoA
GetLogicalDriveStringsA
GetCurrentThreadId
SetCalendarInfoW
GetCurrencyFormatW
GlobalUnlock
DeleteVolumeMountPointW
GlobalLock
GetCompressedFileSizeA
CreateMailslotW
BackupSeek
CreatePipe
Process32NextW
RtlZeroMemory
FreeUserPhysicalPages
CancelWaitableTimer
DeleteTimerQueueEx
GetSystemDefaultLangID
SetThreadIdealProcessor
SetThreadPriority
OpenFileMappingW
IsValidLocale
WaitForSingleObjectEx
GetProcessAffinityMask
GetProcessPriorityBoost
GetCPInfo
LocalCompact
HeapAlloc
EnumCalendarInfoW
SetCurrentDirectoryA
SetTimerQueueTimer
GetThreadLocale
WritePrivateProfileSectionA
VerifyVersionInfoW
MultiByteToWideChar
CreateMutexW
RtlUnwind
GetProcessVersion
GetFileType
IsBadHugeWritePtr
lstrlenW
SetUnhandledExceptionFilter
GetOEMCP
ReplaceFileW
GetSystemDefaultLCID
OpenSemaphoreW
user32
EnumDisplayMonitors
CopyAcceleratorTableW
LoadBitmapA
CheckMenuItem
DlgDirListComboBoxA
OpenInputDesktop
SubtractRect
CharPrevExA
DestroyAcceleratorTable
PostThreadMessageW
GetClipCursor
ValidateRgn
CharLowerW
TranslateMessage
LookupIconIdFromDirectoryEx
SendMessageA
CharToOemW
GetKeyNameTextA
DdeConnectList
InsertMenuA
DdeAbandonTransaction
GetDlgItem
SetWindowsHookW
GetLastActivePopup
IsZoomed
DialogBoxIndirectParamA
GetWindowInfo
DdeQueryNextServer
UnregisterDeviceNotification
CreateAcceleratorTableW
SetKeyboardState
GetSubMenu
ToUnicode
ToAsciiEx
CharPrevA
InvalidateRect
MonitorFromPoint
UnhookWinEvent
GetCaretBlinkTime
LoadCursorFromFileA
SetSysColors
GetMessageExtraInfo
HiliteMenuItem
SetDoubleClickTime
DdeUninitialize
SetDebugErrorLevel
DeferWindowPos
GetAsyncKeyState
SendNotifyMessageW
IsDialogMessageA
EmptyClipboard
CallMsgFilterA
DefFrameProcW
GetMenuInfo
OpenDesktopA
GetClassInfoExA
ScrollWindow
DdeInitializeA
SwitchDesktop
wvsprintfA
GetWindowRect
EnableWindow
UnregisterClassW
wvsprintfW
IsCharAlphaNumericW
GetKeyboardLayoutNameA
EnumDesktopsA
ExitWindowsEx
ReuseDDElParam
EnumPropsExA
FreeDDElParam
SetForegroundWindow
SetLastErrorEx
RegisterWindowMessageW
VkKeyScanA
MoveWindow
SetScrollPos
CreateIconFromResource
SetFocus
GetWindowLongW
RegisterWindowMessageA
DestroyIcon
VkKeyScanExW
SetCaretBlinkTime
GetDlgCtrlID
GetGUIThreadInfo
ArrangeIconicWindows
GetWindowModuleFileNameW
GetDlgItemInt
DefMDIChildProcW
DdeSetQualityOfService
CharNextExA
VkKeyScanW
OpenIcon
MessageBoxExW
IsClipboardFormatAvailable
MenuItemFromPoint
GetMenu
CharPrevW
GetMenuItemInfoW
BeginPaint
PostMessageW
DlgDirListA
SendMessageTimeoutA
GetKeyboardLayout
TrackPopupMenu
SetMessageQueue
GetMessagePos
RegisterShellHookWindow
GetWindowModuleFileNameA
GetThreadDesktop
SwitchToThisWindow
WindowFromDC
ActivateKeyboardLayout
EnumDesktopWindows
GetActiveWindow
FindWindowExA
GetMenuItemInfoA
GetMenuState
EnumClipboardFormats
LookupIconIdFromDirectory
MessageBoxIndirectW
FindWindowW
GetMenuItemCount
GetKeyboardLayoutNameW
SetDlgItemInt
DdeQueryStringA
CallWindowProcW
CharLowerBuffW
MapVirtualKeyA
GetClassLongA
SendMessageW
GetMenuContextHelpId
GetCursorPos
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 254KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ