Static task
static1
Behavioral task
behavioral1
Sample
e475f335c02189cd151425825e1e1bb90ece89220c83931be16a18b5b721a199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e475f335c02189cd151425825e1e1bb90ece89220c83931be16a18b5b721a199.exe
Resource
win10v2004-20220812-en
General
-
Target
e475f335c02189cd151425825e1e1bb90ece89220c83931be16a18b5b721a199
-
Size
209KB
-
MD5
5cf28099173ffd0a889773a539f033fb
-
SHA1
aad0a312fbb7898673e80ce90b0d9038da8fbff6
-
SHA256
e475f335c02189cd151425825e1e1bb90ece89220c83931be16a18b5b721a199
-
SHA512
23a6d4f29b690b67c44dc3ec9e4b58f3a3d1329d915c4de9a5d1f829b6bcbd58149d79a7c745113b13b421d8baac8cab3eae946493adea0a20dd323950582614
-
SSDEEP
6144:fr787ljBYheneWBc7hxeteXUwVQ0P/eGjMo:fr7CShqq9JXUwdP/emMo
Malware Config
Signatures
Files
-
e475f335c02189cd151425825e1e1bb90ece89220c83931be16a18b5b721a199.exe windows x86
750ca52ae9f3aa882b2cac9e34f1eba4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
DeleteCriticalSection
DeviceIoControl
EnterCriticalSection
FindNextFileA
FreeResource
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetExitCodeProcess
GetFileSize
GetStartupInfoW
GetSystemTime
GetTempPathW
GlobalAddAtomA
HeapDestroy
HeapReAlloc
IsBadReadPtr
IsDebuggerPresent
LCMapStringW
LoadLibraryExA
MoveFileA
RtlUnwind
SetEvent
SetHandleCount
TerminateThread
TlsFree
TlsGetValue
VirtualAlloc
comctl32
CreatePropertySheetPageA
CreatePropertySheetPageW
CreateStatusWindowA
CreateToolbarEx
DestroyPropertySheetPage
ImageList_BeginDrag
ImageList_Destroy
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_GetIcon
ImageList_GetIconSize
ImageList_LoadImageA
ImageList_Remove
ImageList_Replace
ImageList_SetIconSize
ImageList_SetImageCount
ImageList_SetOverlayImage
ImageList_Write
InitCommonControls
InitCommonControlsEx
PropertySheetA
shell32
CommandLineToArgvW
DragFinish
ExtractIconExA
FindExecutableW
SHBrowseForFolder
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
SHGetSettings
SHGetSpecialFolderPathW
gdi32
AbortDoc
CreateDCW
ExtCreatePen
ExtEscape
GetBrushOrgEx
GetEnhMetaFilePaletteEntries
GetPixel
GetTextCharsetInfo
GetTextExtentExPointW
GetTextMetricsA
GetWindowOrgEx
IntersectClipRect
InvertRgn
OffsetRgn
OffsetViewportOrgEx
Polyline
SetEnhMetaFileBits
SetMapMode
SetMetaFileBitsEx
StretchDIBits
advapi32
EqualSid
GetSecurityDescriptorDacl
RegEnumKeyExA
RegEnumValueW
RegFlushKey
RegOpenKeyW
RegQueryValueExW
RevertToSelf
user32
CharLowerA
ClientToScreen
CreateMenu
CreateWindowExA
DeleteMenu
DestroyCursor
DestroyMenu
DrawMenuBar
EndPaint
GetClassInfoA
GetForegroundWindow
GetMenuState
GetScrollPos
GetScrollRange
GetTopWindow
GetWindowLongA
GetWindowTextA
IsChild
IsWindow
LoadBitmapA
PeekMessageA
PostQuitMessage
PtInRect
RegisterClipboardFormatA
SetClipboardData
SetMenu
SetScrollPos
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
MrOJHT7C Size: 512B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE