Static task
static1
Behavioral task
behavioral1
Sample
e8205b0104e3b9ab890d47645f7ef2ff6c012a32b13048f7d02fe1ad11e32290.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8205b0104e3b9ab890d47645f7ef2ff6c012a32b13048f7d02fe1ad11e32290.exe
Resource
win10v2004-20220812-en
General
-
Target
e8205b0104e3b9ab890d47645f7ef2ff6c012a32b13048f7d02fe1ad11e32290
-
Size
492KB
-
MD5
9241f0b74b35d9dde8fbf86e388f0b1b
-
SHA1
46e89f1831bcd26e0239053cbae69fc7df3a0fa0
-
SHA256
e8205b0104e3b9ab890d47645f7ef2ff6c012a32b13048f7d02fe1ad11e32290
-
SHA512
4cfa2c6dc463a7f07a2635a9a0ce2355b532814f1a7a029c4d2391cb259dea384326570898219ccae8872b2c4b7c9d073f41748537219f7cbd66d9c16645fcbc
-
SSDEEP
12288:erfSqev9LIPa5ueiGs8xcJZxYp2ykj38y3fpdC:v3MeiGsscfxYpjkj3nfpdC
Malware Config
Signatures
Files
-
e8205b0104e3b9ab890d47645f7ef2ff6c012a32b13048f7d02fe1ad11e32290.exe windows x86
9e4ad6643a21c29914aca6800b614459
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ExtractIconA
SHGetFolderPathA
shlwapi
SHDeleteValueA
SHDeleteKeyA
PathIsDirectoryA
PathRemoveExtensionA
PathAddExtensionA
PathAppendA
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathFileExistsA
SHSetValueA
PathStripToRootA
PathIsUNCA
iphlpapi
GetAdaptersInfo
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetCurrentThreadId
SetEvent
SuspendThread
CreateEventA
GetModuleHandleA
GetModuleFileNameW
InterlockedDecrement
GetCurrentProcessId
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
SystemTimeToFileTime
SetErrorMode
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
FreeResource
GlobalFlags
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GetCPInfo
GetOEMCP
GetPrivateProfileIntA
ResumeThread
GetPrivateProfileStringA
GetCurrentDirectoryA
HeapAlloc
HeapFree
RaiseException
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitThread
CreateThread
HeapSize
FatalAppExitA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
SetStdHandle
SetHandleCount
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetCurrentDirectoryA
SetEnvironmentVariableA
SetThreadPriority
GetAtomNameA
GlobalGetAtomNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetTempPathA
MoveFileExA
RemoveDirectoryA
Sleep
CreateMutexA
GetTempFileNameA
lstrcmpA
lstrcpyA
SetLastError
GetVolumeInformationA
GetComputerNameA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
GetShortPathNameA
CreateFileA
DeviceIoControl
FindResourceA
LoadResource
LockResource
SizeofResource
WaitForSingleObject
TerminateProcess
OpenProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
OutputDebugStringA
FormatMessageA
LocalFree
GetSystemTime
GetTimeZoneInformation
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
lstrlenA
lstrcmpiW
lstrcmpiA
CompareStringW
CompareStringA
lstrlenW
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
WritePrivateProfileStringA
user32
GetMenuItemInfoA
DestroyMenu
PostQuitMessage
SetCursor
ShowOwnedPopups
DeleteMenu
DestroyIcon
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
GetDialogBaseUnits
InflateRect
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
ClientToScreen
UnregisterClassA
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
CharLowerA
CharLowerW
CharUpperA
CharUpperW
PostMessageA
FindWindowExA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextLengthA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetWindowThreadProcessId
EnumWindows
SendMessageTimeoutA
RegisterWindowMessageA
wsprintfA
GetWindowTextA
GetWindow
GetDesktopWindow
FindWindowA
MessageBoxA
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
AppendMenuA
GetMenuStringA
GetMenuState
GetSystemMetrics
ValidateRect
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
IsIconic
gdi32
SetWorldTransform
ModifyWorldTransform
SetMapMode
ExcludeClipRect
PolyBezierTo
ExtSelectClipRgn
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
CreateCompatibleDC
GetStockObject
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
SetGraphicsMode
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
SetRectRgn
PolyDraw
CombineRgn
GetMapMode
PatBlt
DPtoLP
GetTextMetricsA
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
CreateDCA
CopyMetaFileA
PlayMetaFile
GetDeviceCaps
ArcTo
GetCurrentPositionEx
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
PolylineTo
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegSetValueA
RegDeleteValueA
SetNamedSecurityInfoA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
ole32
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
ReadFmtUserTypeStg
CoTaskMemFree
StringFromIID
CoGetMalloc
ReadClassStg
StringFromCLSID
CoTreatAsClass
CreateBindCtx
ReleaseStgMedium
CoTaskMemAlloc
OleDuplicateData
CoDisconnectObject
CoCreateInstance
StringFromGUID2
CLSIDFromString
SetConvertStg
oleaut32
VariantTimeToSystemTime
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
SysStringByteLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantClear
SafeArrayRedim
VariantChangeType
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantInit
SystemTimeToVariantTime
SysReAllocStringLen
VarDateFromStr
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarCyFromStr
VarBstrFromDate
Sections
.text Size: 380KB - Virtual size: 377KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ