Static task
static1
Behavioral task
behavioral1
Sample
e66494f648cf7ed32643d8eab5af4446d60c1b3ae58f3130bb3c945a485d2200.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e66494f648cf7ed32643d8eab5af4446d60c1b3ae58f3130bb3c945a485d2200.exe
Resource
win10v2004-20221111-en
General
-
Target
e66494f648cf7ed32643d8eab5af4446d60c1b3ae58f3130bb3c945a485d2200
-
Size
708KB
-
MD5
0e898da5cae9e135db7557e64106aac0
-
SHA1
cf8a2c26cc4735fe8caaf4800484a4d9849ba9f8
-
SHA256
e66494f648cf7ed32643d8eab5af4446d60c1b3ae58f3130bb3c945a485d2200
-
SHA512
0696f1e62d34886b8c766123d7b5d40e73dfe0f967d4b0241696dac9c8a5f5d651eba3cf5555ade9b800c6b82caf75a9e453cabcbebb530ae5d23442475267d2
-
SSDEEP
12288:bfOUY1/l+aLECmH7VQYMkzQ9tVlJ024zWGow7Jta:rYka2DGL4p
Malware Config
Signatures
Files
-
e66494f648cf7ed32643d8eab5af4446d60c1b3ae58f3130bb3c945a485d2200.exe windows x86
30154ef307daf75af92d52e0a807271d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord2020
ord4580
ord4890
ord4735
ord4212
ord5182
ord605
ord3641
ord1489
ord2902
ord299
ord6703
ord6118
ord1084
ord3683
ord4467
ord4469
ord4473
ord490
ord566
ord3333
ord4261
ord4481
ord2838
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord781
ord911
ord304
ord1126
ord266
ord3997
ord5529
ord5403
ord2468
ord593
ord5225
ord1138
ord6252
ord6251
ord1024
ord5119
ord334
ord5383
ord1497
ord959
ord437
ord4031
ord5975
ord2248
ord1141
ord1185
ord1187
ord1191
ord1917
ord265
ord3609
ord3043
ord5905
ord3602
ord3450
ord3645
ord4705
ord3952
ord2376
ord297
ord1005
ord2131
ord5438
ord5563
ord2272
ord1198
ord1482
ord6754
ord616
ord1144
ord3889
ord4264
ord4482
ord6043
ord5934
ord2768
ord3040
ord4222
ord1922
ord4739
ord4852
ord4257
ord5495
ord2742
ord5412
ord1379
ord5156
ord2051
ord2016
ord6238
ord2621
ord2614
ord4566
ord2815
ord4081
ord3934
ord746
ord558
ord2250
ord1671
ord2253
ord2252
ord313
ord300
ord1128
ord2141
ord368
ord442
ord675
ord3591
ord3682
ord4471
ord4472
ord565
ord4273
ord1361
ord3344
ord5214
ord5151
ord3974
ord4861
ord4864
ord4379
ord4384
ord4381
ord4399
ord4401
ord4386
ord4777
ord4591
ord4181
ord4172
ord4980
ord4790
ord4444
ord756
ord5174
ord2044
ord3428
ord590
ord3635
ord783
ord331
ord907
ord784
ord2271
ord6174
ord4035
ord2324
ord1916
ord6180
ord1486
ord3500
ord742
ord751
ord4267
ord4278
ord5208
ord1905
ord4021
ord2426
ord943
ord2939
ord4310
ord5014
ord5011
ord1914
ord1604
ord3757
ord5169
ord4041
ord562
ord553
ord431
ord2003
ord2145
ord2144
ord5859
ord4299
ord3654
ord1117
ord3502
ord3525
ord1123
ord425
ord3235
ord5673
ord4065
ord5468
ord3021
ord662
ord868
ord1063
ord3169
ord5429
ord2469
ord5491
ord6099
ord1027
ord3389
ord5710
ord4109
ord865
ord1230
ord1091
ord2372
ord747
ord559
ord3174
ord1069
ord5833
ord2164
ord2149
ord1115
ord1670
ord1551
ord6724
ord5912
ord3946
ord1401
ord5152
ord1908
ord5203
ord4282
ord5175
ord1964
ord4262
ord3182
ord354
ord2322
ord310
ord876
ord578
ord757
ord701
ord430
ord762
ord5168
ord5010
ord1572
ord2246
ord1913
ord2615
ord5009
ord5013
ord4309
ord4135
ord2940
ord4904
ord944
ord5356
ord2992
ord2425
ord2424
ord4020
ord1557
ord6725
ord5915
ord1620
ord1617
ord3945
ord1402
ord4244
ord5148
ord1904
ord5073
ord6275
ord4185
ord5207
ord2173
ord1306
ord3403
ord4722
ord4277
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord1963
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4265
ord635
ord3653
ord3499
ord314
ord764
ord1207
msvcr80
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
memmove_s
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
__CxxFrameHandler3
_splitpath_s
_mbsnbcpy_s
_setmbcp
_crt_debugger_hook
_invoke_watson
?terminate@@YAXXZ
malloc
free
memcpy_s
_resetstkoflw
_recalloc
memset
_purecall
_CxxThrowException
wcsncpy_s
atoi
_itoa_s
_getcwd
_chdir
_chdrive
toupper
_controlfp_s
kernel32
CreateDirectoryA
GetFileSize
CopyFileA
MoveFileA
CreateFileA
CloseHandle
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
IsDBCSLeadByte
lstrcmpiA
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetLastError
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
GetCommandLineA
GetTempPathA
RemoveDirectoryA
ResumeThread
FindFirstFileA
GetSystemTimeAsFileTime
DeleteFileA
FindNextFileA
FindClose
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CopyFileExA
GetVersionExA
ExpandEnvironmentStringsA
GetFileAttributesA
GetWindowsDirectoryA
GetProfileStringA
CreateProcessA
GetProcAddress
LocalFree
GetPrivateProfileStringA
lstrcpyA
LocalAlloc
LoadLibraryA
SetErrorMode
GetCurrentThreadId
Sleep
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
GetTickCount
SetEvent
EnterCriticalSection
LeaveCriticalSection
ResetEvent
CreateEventA
InterlockedExchange
GetShortPathNameA
GetACP
GetLocaleInfoA
GetThreadLocale
user32
DestroyWindow
LoadCursorA
SetCursor
CharNextA
PostQuitMessage
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
WaitForInputIdle
SetActiveWindow
SetCapture
ReleaseCapture
SetFocus
EnableWindow
UnregisterClassA
gdi32
DeleteDC
CreateICA
winspool.drv
EnumPrinterDriversA
advapi32
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetMalloc
SHFileOperationA
ole32
OleUninitialize
CoMarshalInterThreadInterfaceInStream
CoInitialize
OleInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoGetInterfaceAndReleaseStream
CoUninitialize
oleaut32
CreateErrorInfo
SetErrorInfo
SysStringByteLen
SysAllocStringByteLen
VarBstrCat
LoadTypeLi
LoadRegTypeLi
DispCallFunc
SysStringLen
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
VarUI4FromStr
SysFreeString
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 508KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE