Static task
static1
Behavioral task
behavioral1
Sample
e84158e99f15255e7862b5758c18c4819a3aa19fb7dfd85e63976780e23f4b78.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e84158e99f15255e7862b5758c18c4819a3aa19fb7dfd85e63976780e23f4b78.exe
Resource
win10v2004-20221111-en
General
-
Target
e84158e99f15255e7862b5758c18c4819a3aa19fb7dfd85e63976780e23f4b78
-
Size
116KB
-
MD5
e8120889943da7d8da71155f85953c42
-
SHA1
c1cc9143a5e884858244265796fc92cfd38da715
-
SHA256
e84158e99f15255e7862b5758c18c4819a3aa19fb7dfd85e63976780e23f4b78
-
SHA512
fee501bcf25b3f3e62b4216f7d42ec6c84291b0b8a9a326d08e2a96f7ba9b1714735e70fbf2e2c641343e90d684a257b9dcae027bca6cd2035f8a1f1f3a4f4fc
-
SSDEEP
1536:6m9Owiq0Bbt6a7sTQlLIaonzW190/sldzGJKgV0SxKOdkdz0:/9/G6+lMaeU0/slRGJKgqSxh2z
Malware Config
Signatures
Files
-
e84158e99f15255e7862b5758c18c4819a3aa19fb7dfd85e63976780e23f4b78.exe windows x86
deb5ce3fcc2a665b78354c6195b02bc6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ShowWindow
ShowCursor
SetWindowPos
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
UpdateWindow
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
GetClipboardData
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
ClientToScreen
CharToOemA
CharLowerBuffA
wsprintfA
LoadIconA
AdjustWindowRect
kernel32
LCMapStringW
lstrlenA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TryEnterCriticalSection
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcessHeap
GetStartupInfoA
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
TlsSetValue
LeaveCriticalSection
LoadLibraryA
MoveFileA
MulDiv
MultiByteToWideChar
OpenEventA
OpenFile
OutputDebugStringA
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadIdealProcessor
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
dinput
DirectInputCreateW
ws2_32
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
WSAGetLastError
WSAStartup
accept
bind
closesocket
connect
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
shell32
SHFileOperationW
ShellExecuteA
SHGetSpecialFolderPathW
advapi32
InitializeSecurityDescriptor
AddAccessAllowedAce
AddAce
AllocateAndInitializeSid
EqualSid
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorDacl
GetTokenInformation
InitializeAcl
OpenProcessToken
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
SetFileSecurityW
RegQueryValueExA
winmm
waveOutPrepareHeader
waveOutOpen
waveOutGetPosition
waveOutGetNumDevs
waveOutGetDevCapsW
waveOutGetDevCapsA
waveOutClose
waveOutReset
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInGetDevCapsW
waveInGetDevCapsA
waveOutUnprepareHeader
waveOutWrite
waveInUnprepareHeader
waveInAddBuffer
mciSendCommandA
timeBeginPeriod
timeEndPeriod
timeKillEvent
timeSetEvent
ole32
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
IsEqualGUID
PropVariantClear
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ