Static task
static1
Behavioral task
behavioral1
Sample
e4b612c2a990f5906905f981e57e7756f306d281f74b2b379c4f6c389acc5366.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e4b612c2a990f5906905f981e57e7756f306d281f74b2b379c4f6c389acc5366.exe
Resource
win10v2004-20220812-en
General
-
Target
e4b612c2a990f5906905f981e57e7756f306d281f74b2b379c4f6c389acc5366
-
Size
113KB
-
MD5
2996cef7bbda1437501576cded75d520
-
SHA1
1d26ea8519f411071e40c28c2ef9433f3fddb853
-
SHA256
e4b612c2a990f5906905f981e57e7756f306d281f74b2b379c4f6c389acc5366
-
SHA512
d09d88976ce918829aca6123a7d457c3d6f4e600202100f88349641f711aa3995291f5628a0f893f4b5ac19587a7fde6dcbd85c5dc4deb28bfb9519cb544970d
-
SSDEEP
3072:AHneyVbWJDHfRNkyNiAQ4fyp67kL0lKRcC:AHnBWV90A7oW
Malware Config
Signatures
Files
-
e4b612c2a990f5906905f981e57e7756f306d281f74b2b379c4f6c389acc5366.exe windows x86
a088a1c0033047d69919bfb7a395a6af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSysColor
KillTimer
DestroyIcon
DestroyWindow
PostQuitMessage
GetClientRect
MoveWindow
GetSystemMenu
SetTimer
SetWindowPlacement
InsertMenuItemA
GetMenu
CheckMenuItem
SetMenuItemInfoA
SetActiveWindow
DefDlgProcA
RegisterClassA
EndDialog
SetDlgItemTextA
EnumClipboardFormats
GetClipboardData
CloseClipboard
GetClassInfoA
CallWindowProcA
SetWindowLongA
IsDlgButtonChecked
SetWindowTextA
CheckDlgButton
GetActiveWindow
MessageBoxA
wsprintfA
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
LoadCursorA
gdi32
GetStockObject
DeleteObject
SetBkMode
SetTextColor
CreateFontIndirectA
SelectObject
GetObjectA
opengl32
glGetBooleanv
glOrtho
glRenderMode
glGetTexGenfv
glEvalCoord2dv
glColor4dv
glTexCoord4f
glTexCoord1fv
kernel32
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
IsDebuggerPresent
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
lstrcatA
HeapAlloc
GetProcessHeap
HeapFree
ExitThread
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetEnvironmentStrings
Sleep
CreateThread
VirtualAlloc
VirtualFree
GetProcAddress
OpenProcess
IsBadStringPtrA
IsBadReadPtr
lstrcmpA
Beep
SetConsoleCP
GlobalWire
DeleteTimerQueue
OpenMutexW
EnumResourceLanguagesW
GetPriorityClass
GetVersion
lstrlenA
lstrcpyA
lstrcpynA
GetFileAttributesA
FindClose
FindFirstFileA
ReadFile
GetTempFileNameA
GetTickCount
GetTempPathA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
TerminateProcess
ResumeThread
OutputDebugStringA
ReadProcessMemory
GetCurrentDirectoryA
VirtualProtectEx
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetModuleHandleA
lstrcmpiA
RtlUnwind
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapSize
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
IsBadWritePtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
WideCharToMultiByte
GetPrivateProfileStructA
WritePrivateProfileStructA
VirtualQueryEx
HeapReAlloc
FreeLibrary
LoadLibraryA
FindNextFileA
FileTimeToSystemTime
CopyFileA
SetFileAttributesA
LocalAlloc
TerminateThread
SetPriorityClass
GetCurrentProcess
GetLastError
WriteProcessMemory
SetCurrentDirectoryA
GetLocalTime
DeleteFileA
ExitProcess
SetProcessShutdownParameters
LocalFree
SetEndOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
DeviceIoControl
FlushFileBuffers
GlobalReAlloc
GetSystemTimeAsFileTime
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileSize
GetFileTime
GetSystemInfo
GetModuleFileNameA
SetFilePointer
VirtualQuery
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ