Static task
static1
Behavioral task
behavioral1
Sample
e1e292dd65de5a17edfc9abb98fd3a0bf3a78ec0db0a51ad43d270050fa2257a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1e292dd65de5a17edfc9abb98fd3a0bf3a78ec0db0a51ad43d270050fa2257a.exe
Resource
win10v2004-20220901-en
General
-
Target
e1e292dd65de5a17edfc9abb98fd3a0bf3a78ec0db0a51ad43d270050fa2257a
-
Size
353KB
-
MD5
2f49efab4621200f04f0c0ded6e5e7e0
-
SHA1
6c8bb539a8705ef8a768c65fa8bd7e3d3fed8b5e
-
SHA256
e1e292dd65de5a17edfc9abb98fd3a0bf3a78ec0db0a51ad43d270050fa2257a
-
SHA512
1e1db5159a90ae50c89289e69a134d80f6fc467683a63d33935baad1314977ae72089df4514f80142cabbf441d9c662340ae5fa9b47097db24e0974a499955f2
-
SSDEEP
6144:WE3CcTlnTIIoRkAFSMx0Ydkdry/PDa6MiixOHnA5Ma6HA7iE:WiCcxEGAFH01hBGg5Ma6H8iE
Malware Config
Signatures
Files
-
e1e292dd65de5a17edfc9abb98fd3a0bf3a78ec0db0a51ad43d270050fa2257a.exe windows x86
616a155266c84d4163b34f5cee9fa239
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2764
ord2763
ord6662
ord4278
ord533
ord5194
ord665
ord3811
ord540
ord3337
ord2818
ord6407
ord1997
ord798
ord535
ord823
ord825
ord5683
ord5710
ord860
ord941
ord939
ord4129
ord858
ord536
ord2915
ord5572
ord800
ord354
ord5186
ord5773
ord5442
ord1979
ord537
msvcrt
_exit
_stricmp
_strnicmp
_XcptFilter
exit
_acmdln
_onexit
__dllonexit
malloc
strcmp
time
__getmainargs
rand
strstr
_vsnprintf
memcpy
wcslen
printf
_wcsicmp
_mbscmp
sprintf
strcpy
strcat
memset
__CxxFrameHandler
strlen
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
srand
_controlfp
_strcmpi
kernel32
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
MultiByteToWideChar
FindResourceA
UnmapViewOfFile
SizeofResource
WriteFile
GetSystemDirectoryA
FindFirstFileA
CopyFileA
GetStartupInfoA
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
CreateRemoteThread
GetProcAddress
GetModuleHandleA
VirtualAllocEx
lstrlenA
FreeLibrary
LoadLibraryA
lstrcatA
GetCurrentProcessId
LockResource
LoadResource
GlobalAlloc
LoadLibraryExA
GlobalFree
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
CreatePipe
GetStdHandle
Sleep
OutputDebugStringA
CreateThread
ExitProcess
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileA
CreateProcessA
GetVersion
user32
PostMessageA
FindWindowExA
MessageBoxA
FindWindowA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ