Static task
static1
Behavioral task
behavioral1
Sample
e2e7a347fab65307707e54c52930b39cbbbe2a55c1b1ff8c40c087e68ea34a55.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2e7a347fab65307707e54c52930b39cbbbe2a55c1b1ff8c40c087e68ea34a55.exe
Resource
win10v2004-20221111-en
General
-
Target
e2e7a347fab65307707e54c52930b39cbbbe2a55c1b1ff8c40c087e68ea34a55
-
Size
408KB
-
MD5
94852d4182e9d107476f3fb6176a9aae
-
SHA1
57e51e765160a1c45019345803790baea246075c
-
SHA256
e2e7a347fab65307707e54c52930b39cbbbe2a55c1b1ff8c40c087e68ea34a55
-
SHA512
2f6789e30b80cdf5c9794b3cb85cb28753d7ac17cd963bda356eec618022d39dc3ad99ace06f4adeaa8ee1ae62209e463c7cfb5c91a95426c11c2ecbcb61e08a
-
SSDEEP
6144:Jpsy62RWRxSjcYWeNd3yW+QnJchNKnB4CPwgDzMyNROiTS:JpfRD4Y1L3yWNnMInSCogPMSO7
Malware Config
Signatures
Files
-
e2e7a347fab65307707e54c52930b39cbbbe2a55c1b1ff8c40c087e68ea34a55.exe windows x86
9ea17aaef0c0c8e29a7de6aba340087f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetProcessHeap
HeapAlloc
HeapSize
GetCurrentThreadId
CompareStringA
IsValidCodePage
GetACP
OpenWaitableTimerW
EnumResourceTypesW
LeaveCriticalSection
VirtualAlloc
GetNamedPipeInfo
GetTimeFormatA
GetSystemTimeAsFileTime
TerminateProcess
TlsGetValue
GetLocalTime
GetFileType
GetProcAddress
InterlockedExchange
FreeEnvironmentStringsA
VirtualQuery
UnhandledExceptionFilter
GetStdHandle
InterlockedIncrement
GetWindowsDirectoryW
ExitProcess
GetCommandLineA
ResetEvent
GetLocaleInfoW
WideCharToMultiByte
GlobalHandle
ReadConsoleA
GetCurrentProcess
WriteConsoleA
ReadConsoleOutputCharacterA
GetWindowsDirectoryA
GetConsoleCP
FindFirstFileExA
CompareStringW
GetLocaleInfoA
SetStdHandle
TlsSetValue
GetOEMCP
FlushFileBuffers
ReadFile
GetUserDefaultLCID
GetConsoleOutputCP
IsDebuggerPresent
TlsAlloc
CreateMailslotW
FreeEnvironmentStringsW
GetCurrentThread
GetLogicalDriveStringsW
GetPrivateProfileSectionNamesA
IsValidLocale
GetUserDefaultLangID
GetDateFormatA
GetTickCount
VirtualFree
SetHandleCount
TlsFree
GetConsoleMode
SetFilePointer
CreateMutexA
InitializeCriticalSection
EnumResourceTypesA
WriteConsoleW
GetCurrentProcessId
HeapFree
EnumSystemLocalesA
RtlUnwind
LCMapStringW
CreateFileA
HeapCreate
HeapDestroy
SetLastError
FreeLibrary
GetProcessHeaps
SetEnvironmentVariableA
QueryPerformanceCounter
GetFileAttributesExA
GetCPInfo
LoadLibraryA
GetLastError
DeleteCriticalSection
InterlockedDecrement
GetStringTypeW
WriteFile
LCMapStringA
GetEnvironmentStringsW
Sleep
SetFileAttributesW
GetFileTime
CloseHandle
GetStartupInfoA
MultiByteToWideChar
LoadLibraryW
GetVersionExA
OpenMutexW
GetStringTypeA
GetModuleFileNameA
GlobalAlloc
CreateProcessW
GetTimeZoneInformation
OpenMutexA
GetMailslotInfo
WaitForMultipleObjectsEx
HeapReAlloc
GetStringTypeExW
GetEnvironmentStrings
SetConsoleCtrlHandler
GlobalAddAtomA
SetUnhandledExceptionFilter
GetModuleHandleA
user32
FindWindowW
ToAsciiEx
GetUpdateRect
GetDlgItemTextA
CheckDlgButton
GetClassNameA
GetKeyState
MessageBoxA
SetMessageExtraInfo
FrameRect
DdeCreateStringHandleA
ShowWindow
CreateWindowExW
DestroyWindow
EnumPropsExA
GetClipboardData
DdeKeepStringHandle
DrawFrameControl
IsCharUpperW
CopyIcon
CreateWindowExA
LoadMenuW
DrawStateA
ModifyMenuW
RegisterClassA
InSendMessageEx
SetSysColors
MsgWaitForMultipleObjectsEx
GetProcessDefaultLayout
WaitForInputIdle
CreatePopupMenu
CharNextExA
DefWindowProcW
GetWindowWord
GetKeyboardLayoutNameW
ActivateKeyboardLayout
EnableScrollBar
GetMenuStringW
GrayStringW
RegisterClassExA
comctl32
ImageList_SetFilter
ImageList_SetOverlayImage
ImageList_LoadImageW
DrawStatusTextW
InitCommonControlsEx
ImageList_Replace
ImageList_GetImageCount
ImageList_Read
ImageList_Destroy
CreateStatusWindow
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ