Static task
static1
Behavioral task
behavioral1
Sample
e994b60a9f6056191d2e76e9c9fb112ea9fde9eb73c3e59be457574e11766589.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e994b60a9f6056191d2e76e9c9fb112ea9fde9eb73c3e59be457574e11766589.exe
Resource
win10v2004-20220812-en
General
-
Target
e994b60a9f6056191d2e76e9c9fb112ea9fde9eb73c3e59be457574e11766589
-
Size
85KB
-
MD5
62f974194c88d609229ce9ef46a18421
-
SHA1
2e817aa48154ff9f5351548bbe6e1cf7fc6d1131
-
SHA256
e994b60a9f6056191d2e76e9c9fb112ea9fde9eb73c3e59be457574e11766589
-
SHA512
7ab58b8008d29f3c0f7d45bc529839c1dc83b8d6617fa73e49a3260825d796771a972087ea09a4a7c029e1c60aaf5ed07e186c29680d0336e6bcb184003aacec
-
SSDEEP
1536:SUz/Re5Gy3U3Fit+MzyDMbROHVLUYm1GmbcyJoZqdPlVUkCVOU01zdJ0aAkCDdMj:S94OUVit7zyORoLJm1lHG+zsjiCo
Malware Config
Signatures
Files
-
e994b60a9f6056191d2e76e9c9fb112ea9fde9eb73c3e59be457574e11766589.exe windows x86
f9879dfcf736ea163d676a1321a3ccac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
expsrv
PutMemVar
rtcNPer
__vbaR8IntI4
EbGetVBAObject
rtcGetMonthOfYear
rtcRightBstr
__vbaLateIdCall
__vbaVarTextTstGt
rtcMIRR
__vbaVarNeg
rtcSLN
__vbaGet3
rtcRate
rtcChangeDrive
__vbaOnGoCheck
__vbaStrToUnicode
__vbaFreeStr
gdi32
GdiIsMetaPrintDC
GetStockObject
CreateMetaFileA
GdiEndDocEMF
StartPage
GdiStartPageEMF
GdiEntry15
UnrealizeObject
GetBrushAttributes
FloodFill
GdiPlayDCScript
GdiAddGlsBounds
EngCreateSemaphore
CombineRgn
CreatePolyPolygonRgn
kernel32
GetCurrentThreadId
Heap32ListFirst
GetCurrentProcessId
DeactivateActCtx
HeapWalk
BuildCommDCBW
LockFileEx
BaseInitAppcompatCacheSupport
Thread32First
VirtualAlloc
Process32Next
IsDebuggerPresent
LoadLibraryA
GetSystemTimeAsFileTime
RaiseException
QueryPerformanceCounter
GetModuleHandleW
GetProcAddress
GetLogicalDriveStringsA
ntdll
RtlNtStatusToDosError
NtSetSecurityObject
RtlDeleteSecurityObject
RtlQueryProcessHeapInformation
LdrLoadAlternateResourceModule
strchr
RtlUnlockMemoryStreamRegion
RtlMultiAppendUnicodeStringBuffer
RtlSizeHeap
cos
NtDebugContinue
ZwQuerySystemEnvironmentValueEx
RtlZombifyActivationContext
atan
msvcp60
?swap@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEXAAV12@@Z
??8std@@YA_NABOABV?$complex@O@0@@Z
??Nstd@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
??1?$basic_filebuf@GU?$char_traits@G@std@@@std@@UAE@XZ
??0?$basic_ostringstream@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?imag@?$_Complex_base@M@std@@QAEMABM@Z
??_D?$basic_istream@GU?$char_traits@G@std@@@std@@QAEXXZ
??Y?$_Complex_base@N@std@@QAEAAV01@ABN@Z
?uflow@?$basic_filebuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?quiet_NaN@?$numeric_limits@D@std@@SADXZ
??1?$basic_ofstream@GU?$char_traits@G@std@@@std@@UAE@XZ
?_Mode@?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEHH@Z
??Xstd@@YAAAV?$complex@N@0@AAV10@ABV10@@Z
?real@?$_Complex_base@N@std@@QAENABN@Z
?_Getcat@?$_Mpunct@D@std@@SAIXZ
iphlpapi
GetUniDirectionalAdapterInfo
CreateIpNetEntry
do_echo_req
NhpAllocateAndGetInterfaceInfoFromStack
GetTcpStatisticsEx
IpReleaseAddress
InternalGetTcpTable
InternalGetIfTable
InternalSetIpStats
GetRTTAndHopCount
GetTcpTable
FlushIpNetTable
GetIcmpStatistics
GetIpErrorString
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ