Static task
static1
Behavioral task
behavioral1
Sample
e6734c7d7c1e0bde952d0d18ea3e2fc5afd5f13cefe4f6bac8f4013fa04c6111.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6734c7d7c1e0bde952d0d18ea3e2fc5afd5f13cefe4f6bac8f4013fa04c6111.exe
Resource
win10v2004-20221111-en
General
-
Target
e6734c7d7c1e0bde952d0d18ea3e2fc5afd5f13cefe4f6bac8f4013fa04c6111
-
Size
308KB
-
MD5
0db6a995f27869c45f71ed175b8735c0
-
SHA1
7a639bcd5f2b12ea14e54fa976ecc1910822b266
-
SHA256
e6734c7d7c1e0bde952d0d18ea3e2fc5afd5f13cefe4f6bac8f4013fa04c6111
-
SHA512
5ba3ff5981e28de50a114568c56aae638570769ba520d85d2d18a4860c5e2d62162bb451d245f70e411493bc293b5506dfebbc3f432ba2fa8f01f36a4a364f55
-
SSDEEP
6144:/QoXeBlPUdEMURGQTVZpIEK1DQod4GOe7WC1hIQ+KkcisA+c:0GE5MQRDtUB+GPWzQue
Malware Config
Signatures
Files
-
e6734c7d7c1e0bde952d0d18ea3e2fc5afd5f13cefe4f6bac8f4013fa04c6111.exe windows x86
78d04d6a5834ffae055f6132a69b3d0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA
OutputDebugStringA
FatalAppExitA
FlushConsoleInputBuffer
GetModuleHandleA
LoadResource
FindResourceExW
DosDateTimeToFileTime
LeaveCriticalSection
GetCommConfig
LocalFileTimeToFileTime
TryEnterCriticalSection
EnumCalendarInfoA
SetErrorMode
GetDiskFreeSpaceW
CopyFileExW
FreeLibrary
VirtualQuery
SetupComm
OpenSemaphoreW
WritePrivateProfileStringA
FlushFileBuffers
GetEnvironmentStringsW
GlobalFindAtomW
lstrcmpiW
GetCurrentProcessId
FindFirstFileExW
ReleaseSemaphore
GetStringTypeExW
SetEndOfFile
ExitProcess
ReleaseMutex
VirtualLock
GetProfileIntA
GetThreadContext
ScrollConsoleScreenBufferA
WriteConsoleOutputCharacterA
GlobalFlags
RaiseException
GetEnvironmentVariableW
SetTimeZoneInformation
GetStartupInfoA
CompareStringA
GetShortPathNameW
CreateDirectoryA
GlobalFree
GetCurrentProcess
SetEvent
SetCommMask
VirtualAlloc
user32
CharToOemW
ScrollDC
GetDCEx
GetPropA
ShowWindowAsync
EmptyClipboard
LoadStringA
UnionRect
GetWindow
SetWindowContextHelpId
SetPropA
CharNextExA
LoadAcceleratorsW
IsDlgButtonChecked
DrawStateW
CopyIcon
InSendMessage
InsertMenuW
CreateWindowStationW
CreateMDIWindowW
BeginPaint
UnregisterDeviceNotification
IsCharUpperW
CharNextW
EnumWindowStationsA
SetClassLongW
ShowWindow
FindWindowExA
LoadMenuIndirectW
MonitorFromRect
SetThreadDesktop
VkKeyScanW
GetSystemMenu
SendInput
PtInRect
SubtractRect
LoadKeyboardLayoutW
gdi32
SetDIBColorTable
EnumFontFamiliesA
CopyMetaFileA
SetLayout
GetTextFaceA
GetPaletteEntries
GetCurrentPositionEx
CreatePatternBrush
GdiComment
CreateSolidBrush
CopyEnhMetaFileW
MaskBlt
PathToRegion
SelectClipPath
GetDIBits
EnumFontsA
comdlg32
ChooseFontW
advapi32
RegSaveKeyW
ImpersonateNamedPipeClient
RegQueryValueW
OpenEventLogW
SetNamedSecurityInfoA
GetUserNameW
SetKernelObjectSecurity
GetServiceKeyNameW
NotifyChangeEventLog
StartServiceCtrlDispatcherA
SetThreadToken
CryptSetHashParam
GetSecurityDescriptorSacl
AccessCheckAndAuditAlarmW
RegDeleteValueA
CloseServiceHandle
SetNamedSecurityInfoW
ReportEventA
EnumServicesStatusW
StartServiceA
RevertToSelf
BuildSecurityDescriptorW
StartServiceW
RegUnLoadKeyA
shell32
FindExecutableW
Shell_NotifyIconA
SHGetSettings
ole32
OleSaveToStream
CoGetTreatAsClass
CoFreeAllLibraries
OleFlushClipboard
comctl32
PropertySheetW
shlwapi
SHStrDupW
PathIsNetworkPathW
PathStripPathW
PathParseIconLocationW
PathIsRelativeA
PathGetCharTypeA
StrCmpIW
PathFindFileNameW
PathIsFileSpecA
PathFindFileNameA
AssocQueryStringW
msvcrt
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__set_app_type
_except_handler3
_controlfp
Sections
cuekqy Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
caekay Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
suqceqm Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aocoqk Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ