Static task
static1
Behavioral task
behavioral1
Sample
e24af8550e9c4f226b6c967fae1a38573660ae07ed8177c20f0d2783ef35178d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e24af8550e9c4f226b6c967fae1a38573660ae07ed8177c20f0d2783ef35178d.exe
Resource
win10v2004-20221111-en
General
-
Target
e24af8550e9c4f226b6c967fae1a38573660ae07ed8177c20f0d2783ef35178d
-
Size
104KB
-
MD5
10f14fd10c8bec375ef858ee205f7e80
-
SHA1
2ebc3fa6a77666d1f3c02d94599a5dcd635a5657
-
SHA256
e24af8550e9c4f226b6c967fae1a38573660ae07ed8177c20f0d2783ef35178d
-
SHA512
f043dbbc6666380ebb5131ed5efca7762de389a4c18117975396a59c2df44f83013a206971f34480bc866e29c74e665664d36b7aed9401736970f1d2590b95cc
-
SSDEEP
1536:S6HGhwSsky22UJ826eeJo5FRfW5RWTiXJ3j++PObmJTA5:S6HGhGkckeJoFfYWTiXJ3i+AmJ
Malware Config
Signatures
Files
-
e24af8550e9c4f226b6c967fae1a38573660ae07ed8177c20f0d2783ef35178d.exe windows x86
7ecf453094136285d8d10465f2165610
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strrchr
memcmp
strcpy
memset
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strstr
srand
time
_access
free
malloc
rand
strlen
strncpy
atol
rename
strcmp
strcat
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??1type_info@@UAE@XZ
_stricmp
_strcmpi
_ltoa
_rmdir
_chmod
_strupr
_strlwr
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
memchr
memmove
??3@YAXPAX@Z
strchr
sscanf
memcpy
strcspn
atoi
_chdrive
_chdir
_strnicmp
kernel32
LockResource
FreeResource
GetTempFileNameA
TerminateProcess
GetModuleHandleA
lstrcpyA
WideCharToMultiByte
lstrlenW
Sleep
lstrlenA
LoadResource
lstrcpynA
IsDebuggerPresent
FreeLibrary
LoadLibraryA
ResetEvent
WaitForSingleObject
SetEvent
CreateEventA
CloseHandle
ReadFile
CreateFileA
DeleteFileA
lstrcatA
GetTempPathA
GetSystemDirectoryA
GetTickCount
GetModuleFileNameA
GetLastError
WriteFile
SetFilePointer
GetFileSize
CopyFileA
RemoveDirectoryA
lstrcmpiA
CreateProcessA
OpenProcess
GetCurrentProcessId
GetLocalTime
GetStartupInfoA
GetCurrentProcess
CreateDirectoryA
MultiByteToWideChar
FormatMessageA
SizeofResource
FindResourceA
GetProcAddress
LocalFree
GetVersionExA
LocalAlloc
InterlockedExchange
InterlockedDecrement
RaiseException
user32
GetClientRect
SetForegroundWindow
CreateWindowExA
DestroyWindow
RegisterClassExA
LoadCursorA
DefWindowProcA
GetSystemMetrics
PostQuitMessage
PeekMessageA
SetWindowPos
SendMessageA
FindWindowExA
IsWindow
SetTimer
KillTimer
GetMessageA
LoadStringA
TranslateMessage
DispatchMessageA
CharLowerA
FindWindowA
GetDlgItem
IsWindowVisible
GetDlgItemTextA
SetDlgItemTextA
BeginPaint
DrawTextA
GetDesktopWindow
FlashWindow
GetWindowThreadProcessId
ReleaseDC
GetDC
EndPaint
DialogBoxParamA
EndDialog
CharUpperA
GetActiveWindow
MessageBoxA
PostMessageA
LoadIconA
ShowWindow
MoveWindow
gdi32
GetDeviceCaps
CreateSolidBrush
SetTextColor
CreateFontA
Rectangle
SelectObject
SetBkColor
advapi32
AdjustTokenPrivileges
RegDeleteKeyA
RegCreateKeyExA
CryptDecrypt
CryptAcquireContextA
CryptDestroyKey
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptEncrypt
CryptReleaseContext
OpenProcessToken
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
RegOpenKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
urlmon
URLDownloadToCacheFileA
URLDownloadToFileA
wininet
InternetOpenA
InternetReadFile
InternetCrackUrlA
InternetCloseHandle
InternetGetConnectedState
InternetOpenUrlA
ole32
OleRun
CoUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
GetErrorInfo
SysFreeString
VariantInit
SysStringLen
VariantCopy
VariantClear
VariantChangeType
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE