Static task
static1
Behavioral task
behavioral1
Sample
e10944f658d1d0925c89fe079b66cede26d533af8d991c0af377e5ce3f6e0fda.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e10944f658d1d0925c89fe079b66cede26d533af8d991c0af377e5ce3f6e0fda.exe
Resource
win10v2004-20220812-en
General
-
Target
e10944f658d1d0925c89fe079b66cede26d533af8d991c0af377e5ce3f6e0fda
-
Size
490KB
-
MD5
0acd3dc36358ef74e1cb0e98a0c566b2
-
SHA1
abdf592a92b3b2edaabd0896280edc0303eb558c
-
SHA256
e10944f658d1d0925c89fe079b66cede26d533af8d991c0af377e5ce3f6e0fda
-
SHA512
d53565afc8e448cfc38c0587c8999f228cc4de25ca187536d563af980d63f756e49fd76717cf130eff822603f253a4c7b5072bd4c699cab5d67a0eed83a3031f
-
SSDEEP
6144:XiH3Aj3JWCtfsLjiVrgg8Yutiqq8pTuvgqY91esYYvvmO4QUgSe46BK+rT2YlEwN:aEZPxgg8YuejgTBmO4uSeK+fVlX3lT
Malware Config
Signatures
Files
-
e10944f658d1d0925c89fe079b66cede26d533af8d991c0af377e5ce3f6e0fda.exe windows x86
2f0f41cb27dbf82d68f2f5394511a6a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord23
ord21
ord20
ord22
ord18
ord17
ord16
ord32
kernel32
SetEvent
InterlockedDecrement
CloseHandle
WaitForSingleObject
CreateThread
CreateEventA
GetSystemWindowsDirectoryA
Sleep
lstrcmpiA
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
LeaveCriticalSection
IsBadCodePtr
EnterCriticalSection
TerminateThread
ResetEvent
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
lstrlenA
GetLastError
GlobalAlloc
GlobalFree
lstrlenW
GetTickCount
GetModuleHandleA
GetStartupInfoA
user32
CharNextA
PostThreadMessageA
GetMessageA
PeekMessageA
MsgWaitForMultipleObjects
UnregisterClassA
DestroyWindow
PostMessageA
DefWindowProcA
CreateWindowExA
RegisterClassA
DispatchMessageA
ole32
CoUninitialize
CoResumeClassObjects
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoTaskMemRealloc
CoSuspendClassObjects
oleaut32
SafeArrayAccessData
SysAllocString
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayDestroy
SysAllocStringLen
SysStringLen
VariantInit
SafeArrayCreate
SafeArrayUnaccessData
VariantClear
SysFreeString
SysStringByteLen
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
msvcrt
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
atof
time
localtime
_initterm
free
wcscpy
strcmp
memcmp
wcstombs
_ftol
fabs
floor
strncpy
strchr
wcslen
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??0exception@@QAE@ABV0@@Z
strcat
strlen
memcpy
??2@YAPAXI@Z
_purecall
memset
_CxxThrowException
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE