Static task
static1
Behavioral task
behavioral1
Sample
e645cdcf1491a2410d24615b7640222a2828e03ca84edb0616449ac5a139b9cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e645cdcf1491a2410d24615b7640222a2828e03ca84edb0616449ac5a139b9cf.exe
Resource
win10v2004-20220812-en
General
-
Target
e645cdcf1491a2410d24615b7640222a2828e03ca84edb0616449ac5a139b9cf
-
Size
286KB
-
MD5
aa30e2a28fd5163ac238401b9f1dfdc5
-
SHA1
0489d9edfeb5b88cf8f2c8ccf0b6136660aa3f1d
-
SHA256
e645cdcf1491a2410d24615b7640222a2828e03ca84edb0616449ac5a139b9cf
-
SHA512
d9e8d167b1f083bd9db4d84586c5a6a0bc3cc653350079e65d8cbd49f8ff29340281607a5ff121660d2a920499dbd07a70f54c9d72b7e83b51766160b6eab28f
-
SSDEEP
6144:+9eVsc5sSoBE1lDMcMZ7i/6y4x6/pbHhLcEDynpkZ0bg5Im:AysSjE6/pzhYEn0bgOm
Malware Config
Signatures
Files
-
e645cdcf1491a2410d24615b7640222a2828e03ca84edb0616449ac5a139b9cf.exe windows x86
d1f2f221579fcebec5bf2bbab2e255a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetSystemWindowsDirectoryA
CreateMutexA
GetCurrentProcess
GetCurrentThreadId
TlsAlloc
GetStdHandle
GetCurrentThread
GetStartupInfoA
IsValidCodePage
GetModuleFileNameA
GetSystemTime
GetCommandLineA
CompareFileTime
GetTickCount
GetProcAddress
CreateEventA
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
GetCurrentProcessId
HeapSize
HeapAlloc
GetProcessHeap
GetCurrentDirectoryA
QueryPerformanceCounter
GetModuleFileNameW
GetLocalTime
GetModuleHandleA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsSetValue
TlsFree
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
IsBadWritePtr
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
IsValidLocale
SetEnvironmentVariableA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameW
user32
CharUpperW
shlwapi
PathStripToRootA
PathCreateFromUrlW
scarddlg
ord2
Sections
.text Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ