Static task
static1
Behavioral task
behavioral1
Sample
ee3e15871ed78787114131c16ba5f638716a23b1390a515d24cf50afb469383d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee3e15871ed78787114131c16ba5f638716a23b1390a515d24cf50afb469383d.exe
Resource
win10v2004-20221111-en
General
-
Target
ee3e15871ed78787114131c16ba5f638716a23b1390a515d24cf50afb469383d
-
Size
397KB
-
MD5
56e124e28e663b77d08e8ab75bb03d09
-
SHA1
e16035fc0dd5dcf38663a973adce5066a4a0fff6
-
SHA256
ee3e15871ed78787114131c16ba5f638716a23b1390a515d24cf50afb469383d
-
SHA512
b4ce3a1dc3011f16ee0e561ad02d501e28277b2cdd383cb9531310205d41fcd229cfb44ee280c101eeaad074f6f1c42accc6d1208466d107d9d2ef8b86be48f5
-
SSDEEP
6144:SXEx2RQh925IshSCdvGh+R4wGwURHYUz75+QtIbbcy:SX62p+skKz4xbnAQqbbcy
Malware Config
Signatures
Files
-
ee3e15871ed78787114131c16ba5f638716a23b1390a515d24cf50afb469383d.exe windows x86
f8b9b5e8d96d5667e1ead1dce8795a77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateEventW
CreateFileMappingW
CreateMutexW
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileSize
GetFileTime
GetLocalTime
GetPrivateProfileStringW
GetProcAddress
GetStartupInfoA
GetSystemDefaultLangID
GetSystemDirectoryW
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVersionExW
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
CopyFileW
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExW
LocalFree
MapViewOfFile
MoveFileW
MultiByteToWideChar
OpenEventW
ProcessIdToSessionId
QueryPerformanceCounter
ReadFile
RegisterWaitForSingleObject
ReleaseMutex
RemoveDirectoryW
SetEndOfFile
SetEvent
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
TryEnterCriticalSection
UnhandledExceptionFilter
UnmapViewOfFile
UnregisterWaitEx
VerSetConditionMask
VerifyVersionInfoW
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpynW
lstrlenW
CompareStringW
CompareStringA
CompareFileTime
CloseHandle
GetDriveTypeA
GetDriveTypeW
VirtualAllocEx
CreateFileW
lstrlenA
GetLastError
LoadLibraryA
GetModuleHandleW
GetProcessHeap
HeapReAlloc
Sleep
user32
GetSysColor
SetWindowLongW
IsWindow
DestroyIcon
LoadIconA
EnableMenuItem
gdi32
BeginPath
AbortPath
CloseEnhMetaFile
GdiFlush
SetBkMode
GetLayout
GetEnhMetaFileA
CreateMetaFileW
CreateSolidBrush
SelectObject
DeleteColorSpace
advapi32
RegOpenKeyA
RegQueryValueExA
shell32
ShellExecuteW
Shell_NotifyIconW
SHGetFolderPathW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
shlwapi
PathIsRootW
StrToIntW
PathIsUNCW
PathStripToRootW
PathFindFileNameW
PathIsRelativeW
StrStrW
StrRChrW
StrChrW
winmm
timeGetTime
msvcrt
wcslen
wcstoul
wcschr
memmove
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_onexit
_vsnprintf
_vsnwprintf
_wcsicmp
_wsplitpath
_wtoi
exit
free
malloc
Sections
.text Size: 384KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ