Static task
static1
Behavioral task
behavioral1
Sample
e6cfc9a53a476cc47c3f4d7df26837615621a7fa8a3588519d293e43b62ffa26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6cfc9a53a476cc47c3f4d7df26837615621a7fa8a3588519d293e43b62ffa26.exe
Resource
win10v2004-20220812-en
General
-
Target
e6cfc9a53a476cc47c3f4d7df26837615621a7fa8a3588519d293e43b62ffa26
-
Size
636KB
-
MD5
662cb63a0518b912d7be599c082ddfc0
-
SHA1
9bbada1faf470e889c886663db220b1ca1e00b0d
-
SHA256
e6cfc9a53a476cc47c3f4d7df26837615621a7fa8a3588519d293e43b62ffa26
-
SHA512
e305029a7c7757ac2e98976072733450959e65ba053be7969f516c018890f40ae28c63ab99cc9c45c93587c3bbd4db16c8959a1a73dd55b89e93bdfbd9cc0b89
-
SSDEEP
12288:yRzflN9LswnIzLXQJwU30dA8M/KtRYBfLenUYrwXguuoBV:ytflNIPXQJmdA8MC3YVbvV
Malware Config
Signatures
Files
-
e6cfc9a53a476cc47c3f4d7df26837615621a7fa8a3588519d293e43b62ffa26.exe windows x86
14ad02344740d4404484437ec5e9e03c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetDriveTypeA
FindNextFileA
TerminateProcess
OpenProcess
GetSystemDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetEnvironmentVariableA
GetDiskFreeSpaceA
CompareStringA
SetFilePointer
VirtualProtect
InitializeCriticalSection
GetLocaleInfoA
VirtualQuery
InterlockedExchange
SetUnhandledExceptionFilter
LCMapStringW
GetVersion
GetSystemInfo
InterlockedDecrement
InterlockedIncrement
FreeLibrary
LoadLibraryA
CreateMutexA
GetLastError
ReleaseMutex
WaitForSingleObject
CloseHandle
WinExec
CreateProcessA
GetCurrentProcess
WritePrivateProfileStringA
MoveFileExA
GetWindowsDirectoryA
FindClose
SetErrorMode
GetVersionExA
CompareStringW
GetProcAddress
GetShortPathNameA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableW
user32
CharPrevA
CharNextA
GetSystemMetrics
SetWindowTextA
LoadIconA
SendMessageA
BringWindowToTop
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
IsWindow
CreateDialogParamA
GetSysColor
MessageBoxA
ExitWindowsEx
FindWindowA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
KillTimer
SetTimer
PostMessageA
DefWindowProcA
advapi32
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
SetTextColor
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 516KB - Virtual size: 921KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 32.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE