Static task
static1
Behavioral task
behavioral1
Sample
e445a981e5e59ae51feafd3e0f2d5a3fcea319d632d3b23a4bf9303957727794.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e445a981e5e59ae51feafd3e0f2d5a3fcea319d632d3b23a4bf9303957727794.exe
Resource
win10v2004-20221111-en
General
-
Target
e445a981e5e59ae51feafd3e0f2d5a3fcea319d632d3b23a4bf9303957727794
-
Size
1.4MB
-
MD5
7e00a7134e0446bd2ff0998e60094fa6
-
SHA1
bd3116964c0bde14192cd1028a6dbc818c53625a
-
SHA256
e445a981e5e59ae51feafd3e0f2d5a3fcea319d632d3b23a4bf9303957727794
-
SHA512
e53067b85df365808efc60d319584b39b0dd2ce1b8ee0c0073617b6bc6c00556e1019e9d11428a9736e1b38ce26cfe83d8e78ab3ebe8e236e4dacc3072bad661
-
SSDEEP
24576:8KuIVsXqarDGV/Dn67Tair2gwnEc9wqA3/Chc:/dRDOzjvqhc
Malware Config
Signatures
Files
-
e445a981e5e59ae51feafd3e0f2d5a3fcea319d632d3b23a4bf9303957727794.exe windows x86
3bdc4647531778b964d7aefc75961dfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EraseTape
CompareStringW
MoveFileWithProgressW
SetFileTime
GetFileAttributesExA
EnumCalendarInfoW
GetModuleFileNameA
FlushViewOfFile
GetPrivateProfileSectionA
MoveFileWithProgressA
CreateMutexA
SetStdHandle
GetSystemDirectoryW
GetConsoleCP
GetConsoleWindow
GetModuleHandleW
CreateEventW
GetPrivateProfileIntA
GetConsoleScreenBufferInfo
GetLogicalDriveStringsA
FindAtomA
ReleaseMutex
QueryInformationJobObject
GetAtomNameW
CopyFileExA
OpenMutexW
MapViewOfFileEx
GetCalendarInfoA
SetConsoleMode
VirtualAlloc
OpenEventW
DosDateTimeToFileTime
GetProcAddress
GetFileSizeEx
GetLongPathNameA
MapViewOfFile
GetSystemWindowsDirectoryA
SwitchToThread
SetLocaleInfoW
GetLocaleInfoA
ReleaseSemaphore
GetLogicalDrives
lstrcatA
GetWindowsDirectoryW
GetPrivateProfileSectionW
GetThreadContext
SetVolumeMountPointA
GetTempPathA
GetWindowsDirectoryA
GetDiskFreeSpaceExA
AreFileApisANSI
GetPrivateProfileIntW
GetTimeFormatW
IsDBCSLeadByteEx
GetNumberOfConsoleInputEvents
GetConsoleAliasesA
WaitForMultipleObjectsEx
DeleteAtom
OutputDebugStringW
SetThreadAffinityMask
GlobalAddAtomW
ProcessIdToSessionId
SetConsoleDisplayMode
FindResourceW
GetTempPathW
SetFileAttributesW
RemoveDirectoryW
ReplaceFileA
GlobalDeleteAtom
OpenJobObjectW
GetCPInfo
FreeEnvironmentStringsA
GetShortPathNameA
GetVolumePathNameW
GetUserDefaultLCID
CreateSemaphoreA
CreateJobObjectA
GetCompressedFileSizeW
CancelIo
CopyFileExW
IsProcessorFeaturePresent
FlushInstructionCache
GetLocalTime
DebugBreak
SetConsoleCP
UnregisterWaitEx
GetConsoleMode
GetEnvironmentVariableW
SetConsoleActiveScreenBuffer
GetFileTime
GetDriveTypeA
GetConsoleAliasExesW
lstrcpynA
CreateMailslotA
GetNumberFormatW
GetCalendarInfoW
GetVolumeNameForVolumeMountPointA
WriteConsoleW
GetConsoleAliasW
ExpandEnvironmentStringsA
HeapCreate
FindResourceExW
CreateDirectoryW
CopyFileW
SetErrorMode
SetNamedPipeHandleState
DisconnectNamedPipe
CreateHardLinkW
UnlockFile
SetThreadPriorityBoost
OpenFileMappingW
SetSystemTimeAdjustment
CreateNamedPipeA
FindNextChangeNotification
SetEndOfFile
FindNextFileA
CreateEventA
CancelWaitableTimer
GetFileInformationByHandle
GetMailslotInfo
GetExitCodeProcess
FindFirstFileExA
GetDateFormatW
ExpandEnvironmentStringsW
SetMailslotInfo
CreateFileW
GetCommandLineA
ResetEvent
VerifyVersionInfoW
OpenJobObjectA
MoveFileExW
SetFilePointerEx
SetConsoleCtrlHandler
GetPrivateProfileStructW
BindIoCompletionCallback
FreeEnvironmentStringsW
GetPrivateProfileStringW
FreeLibraryAndExitThread
GetBinaryTypeA
SetThreadIdealProcessor
GetVolumeInformationW
FindResourceExA
GetProcessTimes
GetThreadLocale
SetThreadContext
SetConsoleOutputCP
GetDiskFreeSpaceA
GetEnvironmentStrings
IsValidCodePage
CompareStringA
OpenSemaphoreA
GetVersion
FreeUserPhysicalPages
AssignProcessToJobObject
GetProcessWorkingSetSize
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
RtlUnwind
HeapReAlloc
HeapAlloc
GetOEMCP
GetACP
InitializeCriticalSectionAndSpinCount
LoadLibraryA
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
SetUnhandledExceptionFilter
Sleep
ExitProcess
WriteFile
GetStdHandle
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
user32
SetCursorPos
CreateWindowExA
GetMessageTime
MoveWindow
LoadImageW
DialogBoxParamW
PostMessageA
DestroyIcon
GetClientRect
DrawMenuBar
TrackPopupMenuEx
GetClassNameW
RemovePropW
LoadStringW
IsWindow
OpenInputDesktop
UnhookWindowsHookEx
GetLastActivePopup
SetCapture
ValidateRect
CreatePopupMenu
GetWindowLongA
CreateDialogIndirectParamW
CharUpperBuffW
UpdateWindow
GetAltTabInfoA
DispatchMessageW
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetSpecialFolderPathW
CommandLineToArgvW
SHGetFolderPathW
SHBrowseForFolderW
SHChangeNotify
SHGetDesktopFolder
SHFileOperationW
ShellExecuteExW
SHBindToParent
SHGetFileInfoW
ShellExecuteW
Sections
.text Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ