Static task
static1
Behavioral task
behavioral1
Sample
e866fe67bca5c344cf9dee8865aab4e26b292aab7cd00bb0c0df30480268d8f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e866fe67bca5c344cf9dee8865aab4e26b292aab7cd00bb0c0df30480268d8f7.exe
Resource
win10v2004-20220812-en
General
-
Target
e866fe67bca5c344cf9dee8865aab4e26b292aab7cd00bb0c0df30480268d8f7
-
Size
276KB
-
MD5
f82b3b096a59504154b2ff37d528f41d
-
SHA1
c0d1f43db82e7979d4c73dcae43ae82b27dd5c64
-
SHA256
e866fe67bca5c344cf9dee8865aab4e26b292aab7cd00bb0c0df30480268d8f7
-
SHA512
a1a9e0d5980c5a570a3a4cd44546d83cb8740b0d2c09a233cb42f96c75651f8868eae1aa7cc958af32947938abe10ec3dc107d65c88ee8cc080c8d5a5bbeaa11
-
SSDEEP
6144:QbCxIjO79VNwBkDU8biHI7B4QvZ7gaow6mvr9VX6bnng6My:QbCxI4/NwBkDZiHIB5mAJVXknng
Malware Config
Signatures
Files
-
e866fe67bca5c344cf9dee8865aab4e26b292aab7cd00bb0c0df30480268d8f7.exe windows x86
dbb2b0563c9eacec93e302f300f52953
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
TranslateMessage
LoadCursorA
UnregisterHotKey
CreateMenu
DeferWindowPos
BeginDeferWindowPos
GetClassNameA
IsWindowEnabled
DispatchMessageA
DrawIcon
LoadImageA
CheckMenuRadioItem
AppendMenuA
GetActiveWindow
IsDialogMessageA
SetWindowsHookExA
PostMessageA
DrawFrameControl
TrackPopupMenu
GetClassInfoExA
EnumWindows
CallNextHookEx
RegisterWindowMessageA
CreateWindowExA
DefWindowProcA
ReleaseDC
FillRect
gdi32
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
StretchDIBits
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
OleSetContainedObject
ws2_32
getprotobynumber
getservbyport
socket
setsockopt
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorGroup
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
QueryServiceStatus
OpenThreadToken
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
OpenProcessToken
StartServiceCtrlDispatcherA
SetSecurityDescriptorOwner
RegEnumKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
SetServiceStatus
LookupPrivilegeValueA
OpenSCManagerA
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetOpenFileNameA
ChooseFontA
GetFileTitleA
FindTextA
comctl32
ImageList_Destroy
CreateToolbarEx
ImageList_Add
DestroyPropertySheetPage
ImageList_SetOverlayImage
ord17
ord6
ImageList_LoadImageA
kernel32
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLocaleInfoA
GetEnvironmentStrings
GetSystemInfo
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
VirtualQuery
GetStringTypeA
FreeEnvironmentStringsW
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapSize
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
CreateFileA
LoadLibraryA
GetACP
GetOEMCP
InterlockedExchange
GetLocaleInfoW
SetUnhandledExceptionFilter
SetFilePointer
ReadFile
CloseHandle
WriteFile
IsBadWritePtr
HeapReAlloc
SetEndOfFile
FreeEnvironmentStringsA
SetTapePosition
VirtualProtect
WideCharToMultiByte
HeapFree
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
HeapAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetVersionExA
LCMapStringA
MultiByteToWideChar
GetLastError
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE