Static task
static1
Behavioral task
behavioral1
Sample
e4663955063464a4abbe71295879fc0580423faf4b1882dbac17967cbe90c65f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4663955063464a4abbe71295879fc0580423faf4b1882dbac17967cbe90c65f.exe
Resource
win10v2004-20220812-en
General
-
Target
e4663955063464a4abbe71295879fc0580423faf4b1882dbac17967cbe90c65f
-
Size
107KB
-
MD5
7fdb6a19d5b397867de97f7bbd4f30ba
-
SHA1
bb7782dd19a540bacc956d6208f9c5f8faf8589e
-
SHA256
e4663955063464a4abbe71295879fc0580423faf4b1882dbac17967cbe90c65f
-
SHA512
c28c610e69242aca3af6e1c56dc20271a3e8673bcc4ff1fb84276aff57219eca1ebf7d8d3da3054686c29baa5a9e08b49b0d0c4c7460c5c777c0c087db804781
-
SSDEEP
1536:XUTznIyjHELkLY9JnKBZqyOksGJdxQyPkk9y2a6ajvkWwLobk17:Xyznjv5Zq70dxzt9y2a6ajOLobw7
Malware Config
Signatures
Files
-
e4663955063464a4abbe71295879fc0580423faf4b1882dbac17967cbe90c65f.exe windows x86
1abe7141f13836dc6d2a974fa4cc1c41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetCurrentProcessId
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
Sleep
RtlUnwind
LoadLibraryA
lstrcatA
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetProcAddress
LoadLibraryW
GetLastError
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GlobalAlloc
HeapCreate
GetProcessHeap
HeapAlloc
GetModuleFileNameA
EncodePointer
GetModuleFileNameW
GetStdHandle
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
user32
BeginPaint
GetWindowThreadProcessId
EndPaint
DestroyWindow
EnumDisplayMonitors
GetClassNameA
ScreenToClient
DdeCreateStringHandleA
SendDlgItemMessageA
LoadBitmapA
GetParent
OpenInputDesktop
GetClientRect
SendMessageA
SetDlgItemTextA
GetIconInfo
GetMenu
GetWindowTextA
SetWindowLongA
MessageBoxA
InvalidateRect
GetWindowLongA
CreateWindowExA
GetDlgItem
EndDialog
GetDesktopWindow
GetCursorPos
CheckDlgButton
DrawMenuBar
DefMDIChildProcA
SetWindowTextA
EnableWindow
SetMenuItemInfoA
GetWindow
gdi32
GetObjectA
StretchDIBits
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
crypt32
CertCreateCRLContext
comctl32
ImageList_Add
ImageList_Create
rpcrt4
RpcImpersonateClient
dbghelp
SymGetSymFromAddr
UnDecorateSymbolName
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ