Static task
static1
Behavioral task
behavioral1
Sample
e0393b9fa28637be2c01291f43bd142de046ebed985c4ec6d94c35aee243d674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0393b9fa28637be2c01291f43bd142de046ebed985c4ec6d94c35aee243d674.exe
Resource
win10v2004-20220812-en
General
-
Target
e0393b9fa28637be2c01291f43bd142de046ebed985c4ec6d94c35aee243d674
-
Size
143KB
-
MD5
d35a36162eefccbd55c913eb6551dee6
-
SHA1
fbdd7ee99f426911d0d85799ad6ffd8274ae7f32
-
SHA256
e0393b9fa28637be2c01291f43bd142de046ebed985c4ec6d94c35aee243d674
-
SHA512
265751e975d03cbcd5c0e14ac96f74372e8c7c20179e7a5b206b4f4ef144018409aa43780d2767d446fb5f50c252599dcf1b4d9cc96eb13fa20ffa3d4317f4ef
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DRf:pe9IB83ID5lf
Malware Config
Signatures
Files
-
e0393b9fa28637be2c01291f43bd142de046ebed985c4ec6d94c35aee243d674.exe windows x86
dbe129d5088d493503666c0323721783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpSendRequest
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
shlwapi
StrCpyW
StrStrIW
StrToIntExA
StrCatW
PathAddBackslashW
StrToIntW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
kernel32
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
IsValidCodePage
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
GetFileSize
CreateFileW
GetTickCount
GetLastError
ReadFile
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
lstrcmpiW
GetCommandLineW
lstrlenW
GlobalFree
lstrcpyW
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeThread
CreateThread
Sleep
HeapAlloc
CreateEventExW
GetTempPathW
lstrcmpiA
lstrcatA
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetCurrentProcessId
GetModuleHandleW
WaitForMultipleObjects
ResumeThread
GetEnvironmentStringsW
TerminateProcess
OpenProcess
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
CreateDirectoryW
SetLastError
LocalFree
GetFileType
GetOEMCP
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
GetProcAddress
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
GetStringTypeA
GetStringTypeW
LCMapStringW
LCMapStringA
GetTempFileNameW
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
user32
LoadIconW
SetWindowTextW
DestroyMenu
SetDlgItemTextW
ShowWindow
SetTimer
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
DialogBoxParamW
GetDlgItemTextW
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ