Static task
static1
Behavioral task
behavioral1
Sample
e075e296bf70fd1697d5e5282ed268fb7ea7a8d4b9ec97dcf1ef64413cb8fc67.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e075e296bf70fd1697d5e5282ed268fb7ea7a8d4b9ec97dcf1ef64413cb8fc67.exe
Resource
win10v2004-20221111-en
General
-
Target
e075e296bf70fd1697d5e5282ed268fb7ea7a8d4b9ec97dcf1ef64413cb8fc67
-
Size
162KB
-
MD5
185d2bcf621c3e229a9208db7547ed60
-
SHA1
cc3210539871ea32c51d431c5bf3900702496cca
-
SHA256
e075e296bf70fd1697d5e5282ed268fb7ea7a8d4b9ec97dcf1ef64413cb8fc67
-
SHA512
afcc62e8e4d4a1ac73f63c5defc5ecf9ff0587581c5c25e171ec83280344feebb2dc30d4b7e3734d797f3165ed9580dc6037fbea9084014711766b06a0456826
-
SSDEEP
3072:zTPBHaVNmGaCUFiA6MpQDujMfg8d81vSsMehbyLciVGMjMxvpytvGoXRi79Ek:zlyQPYA6MmDnovSs4LjMKDRIEk
Malware Config
Signatures
Files
-
e075e296bf70fd1697d5e5282ed268fb7ea7a8d4b9ec97dcf1ef64413cb8fc67.exe windows x86
e47b73b720704dc75c43c7d3bf4cd6aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
CreateDirectoryExA
Module32First
GetSystemInfo
GetThreadLocale
UpdateResourceW
VirtualUnlock
GetLongPathNameA
LoadLibraryW
dciman32
DCICreateOverlay
DCIOpenProvider
DCICreatePrimary
DCICloseProvider
WinWatchOpen
WinWatchNotify
DCICreateOffscreen
WinWatchDidStatusChange
DCIDestroy
GetDCRegionData
WinWatchGetClipList
DCISetSrcDestClip
DCIDraw
DCISetDestination
ntdll
NtWaitForMultipleObjects
NtSetBootOptions
ZwMapUserPhysicalPages
NtAccessCheckByTypeResultListAndAuditAlarm
NtLockRegistryKey
__toascii
RtlAcquirePebLock
NtWaitLowEventPair
NtCreateWaitablePort
ZwOpenFile
sqlsrv32
SQLColAttributeW
SQLSetDescFieldW
SQLSetConnectOptionW
SQLDescribeColW
SQLExecDirectW
SQLCopyDesc
BCP_colfmt
SQLNumParams
SQLDisconnect
SQLSetStmtAttrW
SQLSetPos
SQLRowCount
SQLSetEnvAttr
SQLNumResultCols
SQLCancel
crypt32
I_CryptGetAsn1Encoder
CryptSIPRemoveProvider
CertUnregisterSystemStore
CertVerifyTimeValidity
CryptStringToBinaryA
CertSaveStore
CertEnumSystemStore
I_CryptInsertLruEntry
CertRDNValueToStrW
utildll
QueryCurrentWinStation
GetUserFromSid
GetUnknownString
RegGetNetworkDeviceName
StrConnectState
SetupAsyncCdConfig
WinEnumerateDevices
TestUserForAdmin
CompareElapsedTime
CachedGetUserFromSid
InitializeAnonymousUserCompareList
StrSystemWaitReason
GetSystemMessageW
ConfigureModem
ParseDecoratedAsyncDeviceName
ElapsedTimeString
StrProcessState
AsyncDeviceEnumerate
InstallModem
DateTimeString
NetworkDeviceEnumerate
StandardErrorMessage
StrSdClass
IsPartOfDomain
FormDecoratedAsyncDeviceName
msv1_0
MsvGetLogonAttemptCount
MsvSamValidate
Msv1_0SubAuthenticationPresent
LsaApCallPackage
SpUserModeInitialize
LsaApCallPackagePassthrough
SpInitialize
LsaApLogonTerminated
LsaApLogonUserEx2
MsvSamLogoff
LsaApInitializePackage
SpLsaModeInitialize
SpInstanceInit
Msv1_0ExportSubAuthenticationRoutine
LsaApCallPackageUntrusted
ifsutil
?QueryNtfsVersion@IFS_SYSTEM@@SGEPAE0PAVLOG_IO_DP_DRIVE@@PAX@Z
?GetNextDataSlot@TLINK@@QAEAAVBIG_INT@@XZ
?Initialize@INTSTACK@@QAEEXZ
?GetDrive@SUPERAREA@@QAEPAVIO_DP_DRIVE@@XZ
??0LOG_IO_DP_DRIVE@@QAE@XZ
?QuerySize@TLINK@@QBEGXZ
?SetVolumeLabelAndPrintFormatReport@VOL_LIODPDRV@@QAEEPBVWSTRING@@PAVMESSAGE@@@Z
?IsThisNtfs@IFS_SYSTEM@@SGEVBIG_INT@@KPAX@Z
?Initialize@READ_CACHE@@QAEEPAVIO_DP_DRIVE@@K@Z
??0SPARSE_SET@@QAE@XZ
?GetCannedSecurityDescriptor@CANNED_SECURITY@@QAEPAXW4_CANNED_SECURITY_TYPE@@PAK@Z
?Initialize@DIGRAPH@@QAEEK@Z
??1CANNED_SECURITY@@UAE@XZ
?IsArcSystemPartition@IFS_SYSTEM@@SGEPBVWSTRING@@PAE@Z
?ShellSort@TLINK@@QAEXXZ
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ