Static task
static1
Behavioral task
behavioral1
Sample
e8dd4d6df55afa57dcd77a16234441c9c8e745dddfc2c6ea27a9e0deb0d5ced4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8dd4d6df55afa57dcd77a16234441c9c8e745dddfc2c6ea27a9e0deb0d5ced4.exe
Resource
win10v2004-20220812-en
General
-
Target
e8dd4d6df55afa57dcd77a16234441c9c8e745dddfc2c6ea27a9e0deb0d5ced4
-
Size
43KB
-
MD5
b0c0f6c094797cc85dcc38457ea89f5d
-
SHA1
8cedf53e9411953aeb3d94d1b4bb078d48d3ef7d
-
SHA256
e8dd4d6df55afa57dcd77a16234441c9c8e745dddfc2c6ea27a9e0deb0d5ced4
-
SHA512
c7ab2876879cac60f70623eb8789967b8598b53dc2db5a1953ec65cc39d5fdbd3f247742220923743d9af176e63ae080c70cd8895c8c07c3085dc37d9127af8e
-
SSDEEP
768:0rPAZkdNd5EI6u2Yy8IZ5sesYWn8dQZMQEHCDwBLpZTPCUvQm:0AaDEDhZ5qMQZMA8t9zQm
Malware Config
Signatures
Files
-
e8dd4d6df55afa57dcd77a16234441c9c8e745dddfc2c6ea27a9e0deb0d5ced4.exe windows x86
452eb5e66613ea4c599036d533b4ef93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
keybd_event
UpdateWindow
TranslateMessage
ShowWindow
SetWindowTextA
SetWindowPos
SetTimer
SetForegroundWindow
SetCursorPos
SendNotifyMessageA
SendMessageTimeoutA
RegisterWindowMessageA
RegisterClassExA
PostQuitMessage
PeekMessageA
MoveWindow
ModifyMenuA
MessageBoxA
MapWindowPoints
LoadIconA
mouse_event
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
InsertMenuItemA
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindow
GetSystemMenu
GetSubMenu
GetParent
GetMessageA
GetMenuStringA
GetMenuItemID
GetMenuItemCount
GetMenu
LoadCursorA
GetForegroundWindow
GetDesktopWindow
GetCursorPos
GetClientRect
GetClassNameA
GetAsyncKeyState
EnumWindows
EnumChildWindows
EnableWindow
EnableMenuItem
DrawMenuBar
DispatchMessageA
DefWindowProcA
CreateWindowExA
wsprintfA
kernel32
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
WriteFile
VirtualProtectEx
VirtualFree
VirtualAlloc
TerminateProcess
SystemTimeToFileTime
Sleep
SetPriorityClass
SetLocalTime
SetFileTime
SetFilePointer
SetFileAttributesA
SetEndOfFile
SetCurrentDirectoryA
RtlMoveMemory
ResumeThread
RemoveDirectoryA
ReadProcessMemory
ReadFile
OpenProcess
MoveFileA
LocalUnlock
LocalLock
LocalFree
LocalFileTimeToFileTime
LocalAlloc
LoadLibraryA
GetWindowsDirectoryA
GetVersionExA
GetTickCount
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLastError
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
shell32
ShellExecuteExA
gdi32
DeleteObject
advapi32
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE