Static task
static1
Behavioral task
behavioral1
Sample
e73235e2f8adc47cab2dfa448d62f3c426b52d07e9bafa0a6cbe284bfa19b30d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e73235e2f8adc47cab2dfa448d62f3c426b52d07e9bafa0a6cbe284bfa19b30d.exe
Resource
win10v2004-20220812-en
General
-
Target
e73235e2f8adc47cab2dfa448d62f3c426b52d07e9bafa0a6cbe284bfa19b30d
-
Size
359KB
-
MD5
7a335a9609008b206069b984d02fc011
-
SHA1
87e0f2f9ad5ba8f764c557d9b8d2caeb89832920
-
SHA256
e73235e2f8adc47cab2dfa448d62f3c426b52d07e9bafa0a6cbe284bfa19b30d
-
SHA512
d9040a57801fec2afe957423c3ea53cc409d09bf19f1b4e613a7e50509662f1b880d4c90b3727b273ffc72074de5990ad30f4e4bc69f284e35c97a958ef785bc
-
SSDEEP
6144:vGltUMt+9vfJAqM3MzObtDZvGiBe2TOQQDz3BcLsDsRj5c8bzEPL4mzYt:vGltUM6+qM3BGiBeNDz3Bc4DsRj5cqEU
Malware Config
Signatures
Files
-
e73235e2f8adc47cab2dfa448d62f3c426b52d07e9bafa0a6cbe284bfa19b30d.exe windows x86
aea34a39d97dedea157c3b31a95eaff4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
SetErrorMode
GetFullPathNameW
FlushFileBuffers
SetFilePointer
WriteFile
WritePrivateProfileStringW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
lstrlenA
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
FormatMessageW
LocalFree
InterlockedDecrement
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
MulDiv
GetModuleHandleA
lstrlenW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
CompareStringW
SetLastError
lstrcmpW
GetModuleHandleW
GetVersionExA
FreeResource
DeleteFileW
SetFileAttributesW
GlobalFree
GlobalAlloc
GlobalSize
GetCurrentThread
SetThreadPriority
GetTickCount
GlobalUnlock
GlobalLock
WideCharToMultiByte
LoadLibraryA
LockResource
LoadLibraryW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
GetModuleFileNameW
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateProcess
OpenProcess
GetCurrentProcessId
GetCurrentProcess
GetLastError
Sleep
QueryPerformanceCounter
user32
DestroyMenu
GetSysColorBrush
LoadCursorW
UnregisterClassW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ShowWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
DeregisterShellHookWindow
RegisterShellHookWindow
SetWindowLongW
ReleaseDC
wsprintfW
GetDC
RegisterWindowMessageW
GetAncestor
IsWindowEnabled
SetClipboardData
EmptyClipboard
EnumClipboardFormats
GetDesktopWindow
GetParent
GetCursorPos
WindowFromPoint
GetAsyncKeyState
MapVirtualKeyW
CloseClipboard
SetCursor
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetTopWindow
LoadBitmapW
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
UpdateWindow
InvalidateRect
MoveWindow
SetParent
SetFocus
FindWindowExA
GetWindowLongW
GetClassNameW
GetWindowThreadProcessId
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SetClipboardViewer
FindWindowExW
LoadIconW
GetWindowTextW
EnableWindow
GetFocus
SetTimer
SendMessageW
FindWindowA
mouse_event
SetCursorPos
GetWindowRect
KillTimer
SendMessageA
GetForegroundWindow
IsWindowVisible
IsWindow
keybd_event
SetForegroundWindow
SetWindowPos
gdi32
CreateBitmap
GetStockObject
DeleteDC
TextOutW
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateCompatibleDC
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleBitmap
GetDeviceCaps
GetObjectW
StretchBlt
DeleteObject
ExtTextOutW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathFindExtensionW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
VarUdateFromDate
VariantTimeToSystemTime
SystemTimeToVariantTime
VarDateFromStr
VariantClear
VariantChangeType
VariantInit
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
gdiplus
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipGetImageEncodersSize
GdipDisposeImage
GdipAlloc
GdipFree
GdipGetImageEncoders
GdiplusStartup
GdipCloneImage
GdiplusShutdown
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ