Static task
static1
Behavioral task
behavioral1
Sample
e4d1c05a4a9fec78d05bf420837e897be5165a14a33cd319b17ffd92f6c2313c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4d1c05a4a9fec78d05bf420837e897be5165a14a33cd319b17ffd92f6c2313c.exe
Resource
win10v2004-20221111-en
General
-
Target
e4d1c05a4a9fec78d05bf420837e897be5165a14a33cd319b17ffd92f6c2313c
-
Size
4.5MB
-
MD5
119e788618fa92c04989cb07f37538b2
-
SHA1
698945ae3d604e106cd3eaee5b704a5feaa99781
-
SHA256
e4d1c05a4a9fec78d05bf420837e897be5165a14a33cd319b17ffd92f6c2313c
-
SHA512
f3067d70e80f538b1d429607b9964e87fd0c8235ab5bf1b11c0c4669eacea483d880c11ef7a4a1f9e0740146898e1bced53517066dbfbd935e7250a80f12cee6
-
SSDEEP
98304:y8T3l4pianY+1wpgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk849yp7p:kpw+dJiPD3Nm7AJEgLYX8CNYzQEr0WOj
Malware Config
Signatures
Files
-
e4d1c05a4a9fec78d05bf420837e897be5165a14a33cd319b17ffd92f6c2313c.exe windows x86
490b83949e585fc6504fdb8a60bc993a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrlenA
Sleep
GetFileSize
ReadFile
SetFilePointer
DuplicateHandle
GetModuleHandleA
MultiByteToWideChar
TerminateThread
OpenProcess
IsBadReadPtr
SetLastError
GetVersionExA
FreeLibrary
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
CreateEventA
SuspendThread
CopyFileA
GetSystemTime
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetSystemDefaultLangID
lstrcpyW
lstrlenW
CreateProcessA
MoveFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryW
InitializeCriticalSection
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
GetCurrentThreadId
RaiseException
ExitProcess
GetVersion
UnmapViewOfFile
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
GetCurrentDirectoryA
GetCurrentProcessId
GetSystemDirectoryA
SetFileAttributesA
GetModuleFileNameA
VirtualProtect
VirtualAlloc
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CloseHandle
GetCurrentProcess
TerminateProcess
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GetLocalTime
GetTimeZoneInformation
ExitThread
TlsGetValue
TlsSetValue
CreateThread
VirtualFree
lstrcpyA
CreateFileMappingA
MapViewOfFile
user32
EndDialog
MessageBoxA
GetWindowThreadProcessId
SystemParametersInfoA
GetWindow
GetClassNameA
IsWindow
GetTopWindow
IsWindowVisible
FindWindowA
GetWindowTextA
wsprintfA
LoadIconA
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
GetClassNameW
IsDlgButtonChecked
GetKeyboardLayoutNameA
GetKeyboardLayoutList
UnloadKeyboardLayout
ReleaseCapture
ClientToScreen
SetCursor
SetCapture
LoadBitmapA
LoadCursorA
WindowFromPoint
GetParent
PtInRect
GetWindowDC
GetWindowRect
OffsetRect
IsRectEmpty
ReleaseDC
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
WaitForInputIdle
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
GetDlgItem
gdi32
PatBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
shell32
ShellExecuteExA
ShellExecuteA
ws2_32
inet_addr
htons
connect
send
select
closesocket
socket
inet_ntoa
gethostbyname
WSAStartup
recv
__WSAFDIsSet
imm32
ImmGetDescriptionA
ImmIsIME
shlwapi
PathFindExtensionA
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
StrCatW
PathRenameExtensionA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 988KB - Virtual size: 985KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ