Static task
static1
Behavioral task
behavioral1
Sample
e5a22f92fdaa508603e8ff9000f9ec1e9544ecf9ddefd386d2fd35cd660a809d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5a22f92fdaa508603e8ff9000f9ec1e9544ecf9ddefd386d2fd35cd660a809d.exe
Resource
win10v2004-20221111-en
General
-
Target
e5a22f92fdaa508603e8ff9000f9ec1e9544ecf9ddefd386d2fd35cd660a809d
-
Size
408KB
-
MD5
5c5bb9ef416d007439ab67e89137e345
-
SHA1
e62bc2398424191a4c8170dc9a006c23e0b07c47
-
SHA256
e5a22f92fdaa508603e8ff9000f9ec1e9544ecf9ddefd386d2fd35cd660a809d
-
SHA512
141ffbb436619b6382cfc83db3ad390c0904d70ea4cbe8aefd1ca8914dccc12ed0e97b374679df95a6761aef5d2a00c04e07a45cb9091019e8f0e7baedb16ca2
-
SSDEEP
12288:WnGxkxSoRvl0+3GB8UJugFLHWxzcoxxaKenxIva30:uG6hRvr3Q8UsgFzWh5cKeL
Malware Config
Signatures
Files
-
e5a22f92fdaa508603e8ff9000f9ec1e9544ecf9ddefd386d2fd35cd660a809d.exe windows x86
5a6d18834610e317528f04c6d026013b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharLowerBuffA
GetDesktopWindow
EmptyClipboard
UnhookWindowsHookEx
WINNLSEnableIME
DefWindowProcA
GetWindowTextW
GetDCEx
LookupIconIdFromDirectory
CreateWindowExA
BlockInput
RegisterClipboardFormatA
GetScrollBarInfo
EnumDisplayDevicesW
MessageBoxIndirectW
LoadKeyboardLayoutW
ExcludeUpdateRgn
CharNextExA
CreateAcceleratorTableW
RegisterClassExA
GetKBCodePage
TranslateAcceleratorA
SetForegroundWindow
CreateDialogParamA
GetListBoxInfo
GetMenuCheckMarkDimensions
IsCharAlphaNumericW
FlashWindow
MessageBoxW
ShowWindow
DestroyWindow
CreatePopupMenu
DdeConnect
SendInput
wsprintfA
GetDlgItemTextW
DrawAnimatedRects
GetCursorPos
GetScrollRange
GetClipboardFormatNameW
PostQuitMessage
RegisterHotKey
CallMsgFilterA
TranslateAcceleratorW
TrackPopupMenuEx
CopyAcceleratorTableW
IsCharUpperW
CharLowerW
CloseWindowStation
EnumClipboardFormats
ChangeDisplaySettingsA
GetMenuItemID
RegisterClassA
GetDlgItem
CharNextW
IsCharAlphaW
GetUpdateRgn
GetDlgItemTextA
DdeKeepStringHandle
advapi32
RegConnectRegistryA
RegLoadKeyA
CryptSignHashA
AbortSystemShutdownW
CryptSetProviderW
DuplicateToken
CryptDestroyHash
CryptCreateHash
CryptVerifySignatureW
CryptEnumProvidersA
ReportEventA
LookupAccountSidA
RegOpenKeyA
CryptSetProvParam
LookupAccountSidW
LookupPrivilegeDisplayNameA
RegQueryInfoKeyW
CryptVerifySignatureA
CryptGetDefaultProviderW
comdlg32
FindTextW
PrintDlgW
ChooseColorW
gdi32
CreateMetaFileW
GetObjectA
GetCharABCWidthsFloatA
GetCharWidth32A
StrokeAndFillPath
GetObjectType
DeleteColorSpace
RemoveFontResourceW
GetObjectW
CreateHatchBrush
SelectPalette
LineDDA
GetBitmapDimensionEx
RealizePalette
ExtFloodFill
CreateDCA
GetEnhMetaFileA
DeleteDC
CreateSolidBrush
CreateFontIndirectA
DPtoLP
GetDeviceCaps
CopyMetaFileW
EnumICMProfilesW
PolyTextOutW
comctl32
ImageList_Create
CreateUpDownControl
DestroyPropertySheetPage
DrawStatusTextA
CreateStatusWindowA
ImageList_LoadImageA
CreatePropertySheetPageA
ImageList_Merge
ImageList_DrawEx
InitCommonControlsEx
kernel32
GetStartupInfoW
OpenMutexA
IsBadWritePtr
EnumSystemCodePagesW
HeapFree
LCMapStringW
GetComputerNameW
LCMapStringA
DeleteCriticalSection
GetNamedPipeInfo
IsValidCodePage
GlobalFree
GetACP
GlobalDeleteAtom
CreateProcessA
CreateFileA
GetCurrentThread
GetCommandLineW
TlsSetValue
WideCharToMultiByte
SetConsoleMode
GetUserDefaultLCID
GetModuleHandleA
ReadConsoleInputA
GetCurrentThreadId
CreateMutexA
GlobalGetAtomNameA
DebugBreak
InitializeCriticalSection
lstrcatW
LocalShrink
GetLocaleInfoA
IsDebuggerPresent
UnhandledExceptionFilter
EnumSystemLocalesA
GetSystemDefaultLCID
GetCurrentDirectoryW
VirtualAlloc
LeaveCriticalSection
GetProfileStringA
VirtualQuery
GetFileTime
GetEnvironmentStringsW
GetModuleFileNameA
GetDateFormatA
GetNumberFormatA
IsBadReadPtr
FreeEnvironmentStringsA
FreeLibraryAndExitThread
GetCurrentProcess
WritePrivateProfileSectionA
WriteFile
LoadResource
GetTimeZoneInformation
SetFileAttributesW
GetTickCount
GetTimeFormatA
VirtualFree
InterlockedIncrement
WaitCommEvent
ExitProcess
lstrcpynA
RtlUnwind
TlsFree
SetConsoleCtrlHandler
GetFileType
LocalFileTimeToFileTime
QueryPerformanceCounter
FindAtomW
EnumResourceLanguagesW
InterlockedDecrement
ReadConsoleOutputCharacterA
GetProfileStringW
FoldStringA
GetProcAddress
GlobalAddAtomW
LocalLock
FlushFileBuffers
InterlockedExchange
EnumResourceLanguagesA
TerminateProcess
OutputDebugStringA
CloseHandle
EnumResourceTypesW
GetVersionExA
GetOEMCP
CompareStringW
SetFilePointer
CreateFileMappingA
VirtualProtect
GetCommandLineA
lstrcmpi
LocalSize
HeapDestroy
SetComputerNameA
TlsAlloc
GetModuleFileNameW
HeapValidate
HeapCreate
LocalCompact
TlsGetValue
SetCriticalSectionSpinCount
CreateFileMappingW
SetLastError
GetVersion
IsValidLocale
GetStringTypeW
SetHandleCount
SetEnvironmentVariableA
LocalHandle
EnumDateFormatsA
MultiByteToWideChar
EnterCriticalSection
GetLocaleInfoW
GetStartupInfoA
GetEnvironmentStrings
GetCPInfo
PulseEvent
SetConsoleWindowInfo
GetStdHandle
GetSystemInfo
EnumResourceTypesA
HeapAlloc
ReadFile
OutputDebugStringW
GetStringTypeA
GetLogicalDrives
EnumCalendarInfoW
LoadLibraryA
CreateWaitableTimerA
GetCurrentProcessId
lstrcatA
LockResource
SetStdHandle
CompareStringA
HeapReAlloc
DosDateTimeToFileTime
SetLocaleInfoW
GetLastError
FormatMessageA
EnumTimeFormatsW
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
HeapLock
Sleep
LoadModule
shell32
SHGetDiskFreeSpaceA
ShellExecuteExW
SHGetDataFromIDListA
SHEmptyRecycleBinA
CheckEscapesW
Sections
.text Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ