Static task
static1
Behavioral task
behavioral1
Sample
e3b50035309e0464b03dbbdf742b93591ed0588478aa4d46897caa313e320141.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3b50035309e0464b03dbbdf742b93591ed0588478aa4d46897caa313e320141.exe
Resource
win10v2004-20220812-en
General
-
Target
e3b50035309e0464b03dbbdf742b93591ed0588478aa4d46897caa313e320141
-
Size
108KB
-
MD5
1d23e83a6bd8479762e7446aad4bf036
-
SHA1
ae7acbce6466830bc7d2913d1545e5bc74d88f89
-
SHA256
e3b50035309e0464b03dbbdf742b93591ed0588478aa4d46897caa313e320141
-
SHA512
d891eb9d298372636e44490ba5075d299e14352dda689731de9f7d50cc5574cf95cbe81265ea52baca8413d0f897d52df8d3f000bdab15ed2b5cefa779325bb9
-
SSDEEP
1536:E+FDoKtniY1u7Nn2JFkC2styJjCKICFjC7EWisS+5mlatSfkZJ:E+FDzK71QkbstyJjCKICpC72s/mlaXJ
Malware Config
Signatures
Files
-
e3b50035309e0464b03dbbdf742b93591ed0588478aa4d46897caa313e320141.exe windows x86
ddbb90ebf41500dde8a2155d2d44be6d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantChangeTypeEx
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
kernel32
SetCommConfig
CreateFileA
CloseHandle
FindResourceA
Sleep
DeleteFileA
VirtualFree
SetFilePointer
SetErrorMode
GetSystemInfo
RemoveDirectoryA
ReadFile
GetUserDefaultLangID
OutputDebugStringA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetLocaleInfoA
LoadLibraryA
GetACP
LockResource
GetFileSize
FormatMessageA
FlushViewOfFile
GetExitCodeProcess
GetFullPathNameA
GetLastError
GetSystemDefaultLCID
SetEndOfFile
GetFileAttributesA
LoadResource
VirtualQuery
GetCurrentProcess
SizeofResource
GetProcAddress
GetVersionExA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
IsDBCSLeadByte
CreateProcessA
VirtualProtect
CreateDirectoryA
VirtualAlloc
InterlockedExchange
WriteFile
ReadFile
GetCommandLineA
GetModuleHandleA
GetLastError
GetStdHandle
CreateFileA
GetFileSize
ExitProcess
WideCharToMultiByte
LocalAlloc
TlsSetValue
VirtualAlloc
LocalFree
WriteFile
LeaveCriticalSection
GetFileType
SetEndOfFile
TlsGetValue
SetFilePointer
CloseHandle
VirtualFree
MultiByteToWideChar
GetSystemTime
RaiseException
EnterCriticalSection
DeleteCriticalSection
user32
MessageBoxA
SetWindowLongA
CharPrevA
ExitWindowsEx
TranslateMessage
MsgWaitForMultipleObjects
LoadStringA
CallWindowProcA
DestroyWindow
CreateWindowExA
PeekMessageA
DispatchMessageA
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.packed Size: 114KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
auwsgqe Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gbqkivl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE