Static task
static1
Behavioral task
behavioral1
Sample
e15e39de51736b0aba53a6c6fc5cdf167a3242824170e30e8ccfc392a28d25c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e15e39de51736b0aba53a6c6fc5cdf167a3242824170e30e8ccfc392a28d25c9.exe
Resource
win10v2004-20221111-en
General
-
Target
e15e39de51736b0aba53a6c6fc5cdf167a3242824170e30e8ccfc392a28d25c9
-
Size
109KB
-
MD5
7ab9074cc58ebb6c4cbf888bce5892c9
-
SHA1
7a0d68740c0398cc564d759ec88639abfe2a0485
-
SHA256
e15e39de51736b0aba53a6c6fc5cdf167a3242824170e30e8ccfc392a28d25c9
-
SHA512
5c759cf00435406218e29a204dd375626389683c6aa749deac4586194852a81417a35e7e1c5882ecc60bc8e6861cc401d73c881ffb47ee55dec0bbd126f6b7c4
-
SSDEEP
3072:nggFjmh9BIPI/Gl2+Nxi2hb0EcNpiyXsp4vI5Q4:ng2jOWI/GlrxZF0pqusaw5Q4
Malware Config
Signatures
Files
-
e15e39de51736b0aba53a6c6fc5cdf167a3242824170e30e8ccfc392a28d25c9.exe windows x86
a5f7caacea242e807d5f28343b90b5e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowPos
EnableMenuItem
PostQuitMessage
GetScrollPos
EnumWindows
GetMessageA
UnhookWindowsHookEx
EqualRect
GetSysColorBrush
SetWindowTextA
FrameRect
GetSysColor
GetSubMenu
kernel32
VirtualAllocEx
GetSystemTime
GetTickCount
GetOEMCP
GetACP
GetCurrentProcessId
GetThreadLocale
ExitProcess
GetTimeZoneInformation
GetStartupInfoA
FileTimeToSystemTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedExchange
GetFileAttributesA
RtlUnwind
GetTempPathA
gdi32
CopyEnhMetaFileA
SelectClipPath
DPtoLP
FillRgn
SetViewportExtEx
GetMapMode
ExcludeClipRect
CreateICW
CreateCompatibleBitmap
ole32
CoInitialize
OleRun
CoTaskMemRealloc
DoDragDrop
CoInitializeSecurity
StgOpenStorage
StringFromGUID2
CoRevokeClassObject
CoCreateInstance
advapi32
CheckTokenMembership
GetUserNameA
GetSecurityDescriptorDacl
RegCreateKeyA
CryptHashData
AdjustTokenPrivileges
QueryServiceStatus
FreeSid
RegQueryValueExW
RegCreateKeyExW
msvcrt
__getmainargs
strncpy
fprintf
__setusermatherr
strlen
_fdopen
signal
puts
iswspace
_CIpow
_strdup
__initenv
_mbscmp
fflush
_lock
strcspn
raise
_flsbuf
comctl32
ImageList_DragEnter
ImageList_SetIconSize
ImageList_GetIconSize
ImageList_LoadImageA
InitCommonControls
ImageList_Destroy
CreatePropertySheetPageA
ImageList_GetBkColor
ImageList_Write
ImageList_LoadImageW
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_DrawEx
shell32
SHGetPathFromIDList
ShellExecuteW
DragQueryFileA
DoEnvironmentSubstW
ExtractIconExW
SHBrowseForFolderA
CommandLineToArgvW
ExtractIconW
ShellExecuteEx
DragAcceptFiles
DragQueryFileW
oleaut32
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayPutElement
SysReAllocStringLen
SafeArrayCreate
SafeArrayPtrOfIndex
VariantCopy
SafeArrayRedim
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE