Static task
static1
Behavioral task
behavioral1
Sample
e5b18020696b4de9c543d9d340712d333bea175d6072892a22a492daa8b7bbf0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5b18020696b4de9c543d9d340712d333bea175d6072892a22a492daa8b7bbf0.exe
Resource
win10v2004-20221111-en
General
-
Target
e5b18020696b4de9c543d9d340712d333bea175d6072892a22a492daa8b7bbf0
-
Size
232KB
-
MD5
96f361cf21721a04477175438fb95b64
-
SHA1
3822f4c0e370508d2c0afe7e1783011eb3fe1ba9
-
SHA256
e5b18020696b4de9c543d9d340712d333bea175d6072892a22a492daa8b7bbf0
-
SHA512
858b72859d0cd2d92bfb0cbb58db6835cc9901b7ade573dc9ab42aff2f2d2199f3271453e64dc58006d3d7d36ee5a4590383312db0daf781dc0e733c80a8bbfc
-
SSDEEP
6144:fIn47fQCW9pDJsVPDyi0AvCfNbHeMS+2k:fS4ZKqdCZO+
Malware Config
Signatures
Files
-
e5b18020696b4de9c543d9d340712d333bea175d6072892a22a492daa8b7bbf0.exe windows x86
7a9179f976acb178805e8b29981222e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetVersion
GetStdHandle
GetVersionExA
GetLastError
lstrcpyA
GetModuleFileNameA
CreateEventA
LocalReAlloc
LocalAlloc
lstrlenA
GetCommandLineW
CloseHandle
GetModuleHandleA
FindResourceA
VirtualAllocEx
LoadLibraryA
lstrcmpA
GetCurrentThreadId
GlobalFindAtomA
lstrlenW
GlobalAlloc
FreeResource
GetStringTypeA
GetCommandLineA
ExitThread
GetFileSize
ExitProcess
Sleep
GetThreadLocale
GetProcAddress
IsBadReadPtr
user32
WindowFromPoint
ShowScrollBar
SetTimer
GetFocus
LoadKeyboardLayoutA
EnableMenuItem
GetWindowRect
SetParent
CreateIcon
GetParent
GetCapture
LoadStringA
SendMessageA
GetDesktopWindow
GetIconInfo
UpdateWindow
GetScrollPos
EqualRect
FillRect
DestroyIcon
TrackPopupMenu
GetMessagePos
SetWindowPos
DrawTextA
GetMenu
IntersectRect
DefFrameProcA
LoadCursorA
ClientToScreen
UnhookWindowsHookEx
OffsetRect
ScrollWindow
GetKeyboardLayoutList
SetWindowTextA
PtInRect
CharLowerBuffA
ActivateKeyboardLayout
GetDC
GetKeyboardLayout
EnableScrollBar
IsIconic
GetMenuItemID
GetCursor
GetClassInfoA
KillTimer
GetKeyboardState
OpenClipboard
OemToCharA
GetClientRect
GetMenuState
GetWindowLongW
WaitMessage
DrawAnimatedRects
SendMessageW
GetWindowLongA
DestroyCursor
LoadIconA
RegisterClipboardFormatA
GetPropA
TranslateMDISysAccel
CreateMenu
DestroyWindow
SetCapture
SetCursor
AdjustWindowRectEx
GetKeyboardType
SetClassLongA
GetDlgItem
RegisterWindowMessageA
CallWindowProcA
CharNextW
GetDCEx
GetWindowThreadProcessId
ChildWindowFromPoint
GetClassLongA
CreateWindowExA
SetWindowLongW
CharLowerA
ReleaseCapture
IsDialogMessageW
IsDialogMessageA
DrawFrameControl
GetClipboardData
DispatchMessageA
MessageBoxA
DrawIcon
ScreenToClient
CallNextHookEx
GetActiveWindow
UnregisterClassA
GetScrollInfo
GetSubMenu
FindWindowA
RegisterClassA
SetScrollInfo
GetKeyState
IsWindow
InsertMenuItemA
BeginPaint
SetActiveWindow
DefWindowProcA
EndPaint
InvalidateRect
SetMenuItemInfoA
GetSystemMenu
PostMessageA
SystemParametersInfoA
GetWindow
InsertMenuA
RedrawWindow
TranslateMessage
CharToOemA
DrawEdge
IsWindowUnicode
MapVirtualKeyA
MapWindowPoints
SetClipboardData
PeekMessageA
GetMenuItemCount
MsgWaitForMultipleObjects
SetScrollRange
PeekMessageW
EnumChildWindows
GetWindowDC
GetMenuStringA
MoveWindow
wsprintfA
EnumThreadWindows
GetForegroundWindow
MessageBeep
DestroyMenu
DispatchMessageW
InflateRect
CharNextA
SetFocus
GetKeyNameTextA
SetRect
SetForegroundWindow
CharUpperBuffA
FrameRect
SetWindowLongA
PostQuitMessage
GetWindowPlacement
EnumWindows
GetLastActivePopup
SetWindowsHookExA
SetPropA
DrawIconEx
SetWindowPlacement
SetScrollPos
IsZoomed
IsChild
DrawMenuBar
IsRectEmpty
CheckMenuItem
GetMenuItemInfoA
DeleteMenu
LoadBitmapA
GetWindowTextA
CreatePopupMenu
SetMenu
ShowWindow
IsWindowEnabled
GetSystemMetrics
CloseClipboard
ShowOwnedPopups
GetKeyboardLayoutNameA
GetClassNameA
GetScrollRange
GetSysColor
DefMDIChildProcA
IsWindowVisible
GetCursorPos
gdi32
GetPaletteEntries
GetPixel
GetDIBColorTable
GetRgnBox
ole32
CLSIDFromString
CoGetMalloc
MkParseDisplayName
CreateBindCtx
CoTaskMemFree
CoGetContextToken
CoCreateFreeThreadedMarshaler
shell32
SHGetFolderPathA
Sections
CODE Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc1 Size: 1024B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc6 Size: 1024B - Virtual size: 682B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc3 Size: 1024B - Virtual size: 810B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ