Static task
static1
Behavioral task
behavioral1
Sample
e113e873264a66184bfa4d44fa9f2f35258cda49251f4a6c58bb2ba1b86be44a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e113e873264a66184bfa4d44fa9f2f35258cda49251f4a6c58bb2ba1b86be44a.exe
Resource
win10v2004-20221111-en
General
-
Target
e113e873264a66184bfa4d44fa9f2f35258cda49251f4a6c58bb2ba1b86be44a
-
Size
343KB
-
MD5
a4a91ccb655d1c9eb0c7f61537918b0e
-
SHA1
96bc2b04dd99eb3ff1591041d8436600d9c36510
-
SHA256
e113e873264a66184bfa4d44fa9f2f35258cda49251f4a6c58bb2ba1b86be44a
-
SHA512
498b8ffea179d866856915c8c4731f0585def2839f0d84a037c4017294f582ce9fbbcbd0314058e1155b0a175b37835fa8ed5139f1c2ffb7c5a2d500c0180ffd
-
SSDEEP
6144:ZnHidqXHMpeBIDCyY+Ek02FGGeLfZw6iJsKsDh83ByIWDS4Fvh64S097:ZnH3XS9e402FGGqYsKsDzJfr
Malware Config
Signatures
Files
-
e113e873264a66184bfa4d44fa9f2f35258cda49251f4a6c58bb2ba1b86be44a.exe windows x86
d9622ae5d59d8eb8ede548a0f53b3d7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CopySid
GetLengthSid
GetUserNameA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
kernel32
AllocConsole
ClearCommBreak
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreatePipe
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetCommState
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetProcessTimes
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAdjustment
GetThreadTimes
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
SetCommBreak
SetCommState
SetCommTimeouts
SetConsoleMode
SetCurrentDirectoryA
SetEvent
SetHandleInformation
SetUnhandledExceptionFilter
TlsGetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
msvcrt
_itoa
_ltoa
_stricmp
_strnicmp
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_isctype
_onexit
_pctype
_setmode
_vsnprintf
_winmajor
abort
atexit
atoi
calloc
exit
fclose
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
fread
free
fwrite
getenv
malloc
memchr
memcmp
memcpy
memmove
printf
puts
qsort
realloc
remove
signal
sprintf
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strftime
strncmp
strncpy
strrchr
strspn
strtol
strtoul
time
tolower
ungetc
vfprintf
user32
FindWindowA
GetActiveWindow
GetCapture
GetClipboardOwner
GetCursorPos
GetForegroundWindow
GetLastActivePopup
GetQueueStatus
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
PostThreadMessageA
SendMessageA
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 14KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE