Static task
static1
Behavioral task
behavioral1
Sample
e74de580b480b90f9f59d37e9e2f260d3afabfc8f665e1f58898f34def920662.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e74de580b480b90f9f59d37e9e2f260d3afabfc8f665e1f58898f34def920662.exe
Resource
win10v2004-20220812-en
General
-
Target
e74de580b480b90f9f59d37e9e2f260d3afabfc8f665e1f58898f34def920662
-
Size
841KB
-
MD5
078e1b72d78867f00b575e43304c6770
-
SHA1
2312f5ca712c577ccf9a1e20699569a0ed53d0e7
-
SHA256
e74de580b480b90f9f59d37e9e2f260d3afabfc8f665e1f58898f34def920662
-
SHA512
7c7cbbc48cb3d646678f01ee0d56683db1396d70a47b18bc7bcc6b34f3cfc00bef995f451f8720dda37d71ca8f31a7104a9eda381467c799b3998ac5a57ae9ef
-
SSDEEP
24576:CqVk+j02nRENz5sEERIRLY+aPtul1aqr:CqVtREzKaY+aPYLaqr
Malware Config
Signatures
Files
-
e74de580b480b90f9f59d37e9e2f260d3afabfc8f665e1f58898f34def920662.exe windows x86
19acb2e70eb11983a2f7e69d48cd45d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
SetHandleCount
SetEnvironmentVariableA
GetLastError
VirtualAlloc
GetWindowsDirectoryA
LockFile
SetFilePointer
UnlockFile
FileTimeToLocalFileTime
GlobalLock
FlushFileBuffers
IsDebuggerPresent
GetStartupInfoA
HeapCreate
WriteConsoleA
GetConsoleOutputCP
TlsSetValue
GlobalDeleteAtom
ConvertDefaultLocale
InterlockedDecrement
TlsAlloc
GlobalHandle
GetCommandLineW
TlsGetValue
GetCurrentThread
GetStringTypeA
GetLocaleInfoA
InterlockedExchange
VirtualFree
lstrcmpA
LocalFree
ReadFile
SizeofResource
GlobalFlags
UnhandledExceptionFilter
GetCurrentProcessId
LoadResource
FindClose
SetEndOfFile
LocalFileTimeToFileTime
WriteFile
RtlUnwind
VirtualQuery
LockResource
GetFileSize
GlobalReAlloc
LCMapStringA
InterlockedIncrement
SetLastError
GetStdHandle
CloseHandle
SetStdHandle
LocalReAlloc
GetVersion
GetConsoleCP
GetACP
GetModuleFileNameA
SetFileTime
HeapFree
FileTimeToSystemTime
TerminateProcess
SetUnhandledExceptionFilter
LocalAlloc
TlsFree
lstrlenA
HeapAlloc
RaiseException
EnterCriticalSection
HeapReAlloc
GetEnvironmentStrings
DeleteCriticalSection
EnumResourceLanguagesW
GetProcessHeap
GetSystemTimeAsFileTime
HeapDestroy
MulDiv
Sleep
HeapSize
SystemTimeToFileTime
FreeEnvironmentStringsA
CreateFileA
GetThreadLocale
InitializeCriticalSection
DuplicateHandle
CompareStringA
GetTimeZoneInformation
FreeResource
GetVersionExA
GetConsoleMode
GetCommandLineA
GetFileTime
GetSystemDirectoryA
SetErrorMode
GetSystemInfo
QueryPerformanceCounter
FreeLibrary
GetOEMCP
LeaveCriticalSection
lstrcpyA
GetCurrentThreadId
GetModuleHandleA
LoadLibraryA
GlobalFree
GetProcAddress
lstrcatA
GlobalAlloc
GlobalUnlock
ExitProcess
user32
KillTimer
SetMenu
SetTimer
WindowFromPoint
GetForegroundWindow
GetMenu
SetScrollInfo
GetWindowRgn
ValidateRect
BringWindowToTop
SetCursor
SetCapture
InvalidateRgn
GetMenuItemCount
TranslateMessage
ScrollWindow
IsRectEmpty
TrackPopupMenu
GetKeyState
GetWindow
UnhookWindowsHookEx
MapDialogRect
GetMenuItemID
SetParent
GetDlgCtrlID
GetScrollRange
CallNextHookEx
AdjustWindowRectEx
GetCursorPos
GetNextDlgGroupItem
DeferWindowPos
GetNextDlgTabItem
GetSysColorBrush
SetWindowContextHelpId
ReleaseCapture
OffsetRect
ClientToScreen
ShowScrollBar
MapWindowPoints
SetScrollRange
GetMenuState
EndPaint
GetWindowThreadProcessId
GetDCEx
UpdateWindow
EqualRect
LockWindowUpdate
GetSysColor
IsChild
GetLastActivePopup
DrawIcon
SendDlgItemMessageA
GetSystemMenu
EnableMenuItem
InflateRect
SetWindowPos
GetWindowDC
PtInRect
GetDlgItem
SetWindowRgn
IsIconic
SystemParametersInfoA
GetActiveWindow
BeginPaint
DeleteMenu
SetFocus
GetMenuCheckMarkDimensions
IntersectRect
SetRectEmpty
DestroyIcon
ShowWindow
GetClientRect
CheckMenuItem
SetMenuItemBitmaps
IsWindowEnabled
ReleaseDC
GetWindowRect
SetActiveWindow
EndDialog
GetDesktopWindow
IsWindowVisible
EndDeferWindowPos
ReuseDDElParam
GetParent
GetSubMenu
IsWindow
FillRect
GetScrollInfo
SetForegroundWindow
UnregisterClassA
IsZoomed
RedrawWindow
SetScrollPos
InvalidateRect
GetMessageTime
PostQuitMessage
GetFocus
MoveWindow
MessageBeep
GetWindowPlacement
DestroyMenu
CreatePopupMenu
GetScrollPos
ShowOwnedPopups
GetTopWindow
SetRect
UnpackDDElParam
ScreenToClient
DestroyWindow
GetMessagePos
CopyRect
GetSystemMetrics
BeginDeferWindowPos
GetDC
GetCapture
gdi32
CombineRgn
PtVisible
ScaleWindowExtEx
SaveDC
CreateSolidBrush
CreatePatternBrush
SetBkMode
BitBlt
ScaleViewportExtEx
RestoreDC
GetDeviceCaps
ExtSelectClipRgn
GetClipBox
CreateCompatibleDC
GetMapMode
DPtoLP
GetTextColor
SetViewportExtEx
RectVisible
SetViewportOrgEx
ExcludeClipRect
Escape
SetRectRgn
SetWindowExtEx
CreateBitmap
OffsetRgn
CreateCompatibleBitmap
OffsetViewportOrgEx
SelectClipRgn
PatBlt
SetTextColor
SetBkColor
CreateEllipticRgn
CreateRectRgn
Ellipse
SetMapMode
StretchDIBits
IntersectClipRect
SelectObject
DeleteDC
GetStockObject
GetBkColor
GetWindowExtEx
CreateRectRgnIndirect
DeleteObject
GetRgnBox
GetPixel
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragFinish
ole32
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleFlushClipboard
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleInitialize
CoGetClassObject
OleIsCurrentClipboard
OleUninitialize
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
CoRevokeClassObject
oleaut32
SysAllocStringLen
VariantCopy
SysStringLen
SafeArrayDestroy
VariantClear
SysFreeString
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantInit
VariantChangeType
OleLoadPicture
OleCreateFontIndirect
SysAllocString
comctl32
ImageList_LoadImageW
shlwapi
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathFindExtensionW
PathIsUNCW
StrCatBuffA
PathRemoveExtensionW
msvcrt
atoi
Sections
.text Size: 555KB - Virtual size: 554KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 262KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ