Static task
static1
Behavioral task
behavioral1
Sample
e7c875db558080e9199f17bd01a609551fe7b6bfbf5d7244029b2c4320fefc49.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7c875db558080e9199f17bd01a609551fe7b6bfbf5d7244029b2c4320fefc49.exe
Resource
win10v2004-20221111-en
General
-
Target
e7c875db558080e9199f17bd01a609551fe7b6bfbf5d7244029b2c4320fefc49
-
Size
376KB
-
MD5
5a28fdacec4e3d07442dbe1a2cd9a211
-
SHA1
b99f55e7990cc1ca3a521c42ecc3135094add315
-
SHA256
e7c875db558080e9199f17bd01a609551fe7b6bfbf5d7244029b2c4320fefc49
-
SHA512
37ef4f343271af2b86ca24573ede3df98e9f77c50fd67c0f49f2ded2dc2b140c71e524fffad442a8d3a34552131432fc5dc0d588f77457ee3c5922bb44040756
-
SSDEEP
6144:VAOA1EhwjOAplM8GOSvdjN8lsaXpiyGsxuBnUQUsJ0gNAd:VmCwjOAplM8qvd6eGpGh9f0EAd
Malware Config
Signatures
Files
-
e7c875db558080e9199f17bd01a609551fe7b6bfbf5d7244029b2c4320fefc49.exe windows x86
d3d9d22da4d1101d145d16be9f0044d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendDlgItemMessageA
LoadStringA
CharNextA
DialogBoxParamA
IsCharAlphaA
CharNextExA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
GetWindowRect
SystemParametersInfoA
MessageBeep
PeekMessageA
GetSysColor
GetClassNameA
MessageBoxA
DispatchMessageA
MapWindowPoints
GetClientRect
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
gdi32
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
DeleteObject
CreateFontIndirectA
comctl32
PropertySheetA
kernel32
GetLocaleInfoA
WriteConsoleA
GetCurrentProcessId
LoadLibraryA
QueryPerformanceCounter
DeleteCriticalSection
GetModuleFileNameA
WriteFile
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLastError
GetConsoleOutputCP
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
HeapSize
GetTickCount
GetCPInfo
VirtualAlloc
FatalExit
GetCurrentThread
IsProcessorFeaturePresent
FindFirstFileExA
LeaveCriticalSection
CopyFileA
HeapAlloc
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
CloseHandle
SetStdHandle
GetFileType
RtlUnwind
LCMapStringA
LCMapStringW
FlushFileBuffers
lstrcpynA
CompareStringA
FindResourceA
lstrlenA
lstrcpyA
FindClose
FindFirstFileA
GetDiskFreeSpaceA
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetFileAttributesA
lstrcatA
GetSystemTimeAsFileTime
GetStartupInfoA
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sections
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pe Size: 128KB - Virtual size: 45.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ