Static task
static1
Behavioral task
behavioral1
Sample
e858211ed868f43a70b2812f3c8569612096c52fec07729e70e38fa2f53aad94.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e858211ed868f43a70b2812f3c8569612096c52fec07729e70e38fa2f53aad94.exe
Resource
win10v2004-20220812-en
General
-
Target
e858211ed868f43a70b2812f3c8569612096c52fec07729e70e38fa2f53aad94
-
Size
97KB
-
MD5
2e67539cd571b9c8c1a852da109ffe60
-
SHA1
84629056e3511b9e044e99bbf2ee5d6e85790805
-
SHA256
e858211ed868f43a70b2812f3c8569612096c52fec07729e70e38fa2f53aad94
-
SHA512
c2a859ca9b776526ef8603e3da9d5c63c28d220da474db046dd1077fecaaef4370f68ab1fd869410e61d3bccade19a8fdcc92f8d0b491dfa9f3596647a674393
-
SSDEEP
1536:8SHpXfGxKjqArOgFm7BYUfng9fMGQkINB1Eq:BXO2qwWZnkfIkIWq
Malware Config
Signatures
Files
-
e858211ed868f43a70b2812f3c8569612096c52fec07729e70e38fa2f53aad94.exe windows x86
c01572d51fa86de194366162e0b61dbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
EnumSystemLocalesA
GetProcAddress
DeleteCriticalSection
GetCommandLineW
IsValidLocale
GetModuleFileNameA
VirtualAlloc
LoadLibraryA
GetTimeZoneInformation
GetVersionExW
WaitForSingleObject
LocalFree
user32
PostMessageW
GetKeyState
GetScrollPos
CallWindowProcW
mouse_event
CreateWindowExW
DispatchMessageA
GetMessageA
GetClientRect
GetDlgItemInt
UpdateWindow
TranslateMessage
GetMenuItemID
GetDlgItem
DeferWindowPos
DestroyAcceleratorTable
EnableMenuItem
TrackPopupMenu
gdi32
GetStockObject
CreatePatternBrush
PatBlt
OffsetWindowOrgEx
DeleteObject
SelectObject
CreateFontW
SetBkColor
MoveToEx
CreateFontIndirectW
ExtTextOutW
DeleteDC
Rectangle
CreateCompatibleDC
RestoreDC
CreateHatchBrush
comdlg32
ChooseColorW
PrintDlgW
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExW
RegDeleteValueW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
IsTextUnicode
RegOpenKeyExW
RegCreateKeyExW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dahglxk Size: - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE