Static task
static1
Behavioral task
behavioral1
Sample
e08013d1e2555bf593bd2073c26e29f14a6d56b836ccf99aa853a5df2588477f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e08013d1e2555bf593bd2073c26e29f14a6d56b836ccf99aa853a5df2588477f.exe
Resource
win10v2004-20220812-en
General
-
Target
e08013d1e2555bf593bd2073c26e29f14a6d56b836ccf99aa853a5df2588477f
-
Size
124KB
-
MD5
96176ae52df48f6f41df095e45e96fa9
-
SHA1
03f3155963e5073743579a7dc2687229e6dcf1aa
-
SHA256
e08013d1e2555bf593bd2073c26e29f14a6d56b836ccf99aa853a5df2588477f
-
SHA512
d2ac16e65bbbda5549b5e30e8fcd343f20b0b0baed711ddd393045976f1a8b10154a9175ecb4cb90682bfd3f7a7f27b8e58a24b63e58060671e080aa56cd6ce8
-
SSDEEP
3072:bxnHDAprMbwKGicWR94P+9Y/9tuyBykIgROlRkJlq0D3m5Q:bQapGKAJ9tnKghlD3m
Malware Config
Signatures
Files
-
e08013d1e2555bf593bd2073c26e29f14a6d56b836ccf99aa853a5df2588477f.exe windows x86
d1f306c714126396b4f42298f237622f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput
DirectInputCreateW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
gdi32
GetDeviceCaps
GetStockObject
winmm
timeSetEvent
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutPrepareHeader
waveOutOpen
waveOutGetPosition
waveOutGetNumDevs
waveOutGetDevCapsW
waveOutGetDevCapsA
waveOutClose
waveInUnprepareHeader
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInGetDevCapsW
mciSendCommandA
timeBeginPeriod
timeEndPeriod
timeKillEvent
waveInAddBuffer
waveInClose
waveInGetDevCapsA
advapi32
AddAce
SetSecurityDescriptorDacl
SetFileSecurityW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
GetAclInformation
GetAce
EqualSid
AllocateAndInitializeSid
AddAccessAllowedAce
ole32
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
PropVariantClear
kernel32
SetThreadPriority
SetThreadIdealProcessor
TerminateProcess
SetStdHandle
SetLastError
SetHandleCount
SetFileTime
SetFilePointer
SetEvent
SetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
SetWaitableTimer
TlsAlloc
Sleep
WriteConsoleW
WriteFile
lstrlenA
SetThreadAffinityMask
SetEndOfFile
SetCurrentDirectoryA
RtlUnwind
ResumeThread
RemoveDirectoryW
ReleaseSemaphore
ReadFile
RaiseException
QueryPerformanceFrequency
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
CreateWaitableTimerA
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcessHeap
GetStartupInfoA
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
MoveFileA
MulDiv
MultiByteToWideChar
OpenEventA
OpenFile
OutputDebugStringA
PeekNamedPipe
QueryPerformanceCounter
ws2_32
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
socket
send
select
recv
listen
ioctlsocket
inet_addr
htons
htonl
connect
closesocket
bind
WSAGetLastError
WSAStartup
accept
user32
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
SetWindowPos
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PeekMessageA
CharToOemA
MsgWaitForMultipleObjects
MessageBoxW
LoadIconA
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
GetClipboardData
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
ClientToScreen
CharLowerBuffA
OpenClipboard
ShowCursor
AdjustWindowRect
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ