Static task
static1
Behavioral task
behavioral1
Sample
e37a0ece30267233f1dddf3c2300393f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e37a0ece30267233f1dddf3c2300393f.exe
Resource
win10v2004-20220812-en
General
-
Target
e37a0ece30267233f1dddf3c2300393f.bin
-
Size
1.8MB
-
MD5
e37a0ece30267233f1dddf3c2300393f
-
SHA1
27610367c41c1b8d3a26885b40fd7aac748189b2
-
SHA256
bb7e2066f53bdbb8e93edfa8e900d5be3e2d00ca0a59f9feaa8b8107db7a5d4d
-
SHA512
a0e5ceafb39f9ad3774d6a250646bae5f5595c1330bef3df7d448778ee519bc35ce221526c1a4d3db88107b5ccf1b465eef11e5b00cfc680bcdb9cea92ba87c2
-
SSDEEP
24576:u+KpPMyIIzkQ8dEaMTbAbyR0seBM+VEzif+b9z1WexjaGWMtavBB3MmtP6mRR3sA:6Tv9PcvhuaGRU3HtP6mRR3s9fa7B
Malware Config
Signatures
Files
-
e37a0ece30267233f1dddf3c2300393f.bin.exe windows x86
bf1619301d6638d5330bd0d6299a7f70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
CopyFileW
MoveFileW
SetLastError
GetModuleHandleExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStdHandle
GetEnvironmentVariableW
GetFileType
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
DeleteFiber
ConvertFiberToThread
FreeLibrary
LoadLibraryA
LoadLibraryW
WideCharToMultiByte
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEndOfFile
HeapSize
WriteConsoleW
SetEnvironmentVariableW
LocalAlloc
GetCurrentProcess
GetLogicalDrives
GetConsoleWindow
SetCurrentDirectoryW
CloseHandle
DeleteFileW
GetLastError
Sleep
SetFileAttributesW
ReleaseMutex
GetFileAttributesW
CreateMutexA
FindClose
ExpandEnvironmentStringsW
FindNextFileW
FindFirstFileW
WriteFile
CreateDirectoryW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
GetCurrentThread
GetExitCodeThread
CreateEventW
GetTickCount
EncodePointer
DecodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForSingleObject
RtlUnwind
RaiseException
ExitProcess
SetConsoleCtrlHandler
CreateFileW
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
HeapAlloc
HeapFree
ExitThread
HeapReAlloc
GetCommandLineA
GetCommandLineW
GetACP
FlushFileBuffers
GetConsoleCP
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetProcessHeap
GetTimeZoneInformation
FindFirstFileExW
user32
ShowWindow
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
advapi32
RegisterEventSourceW
DeregisterEventSource
SetSecurityDescriptorDacl
SetEntriesInAclA
AdjustTokenPrivileges
SetFileSecurityW
LookupPrivilegeValueA
SetNamedSecurityInfoW
OpenProcessToken
InitializeSecurityDescriptor
RegCloseKey
AllocateAndInitializeSid
RegCreateKeyExA
RegSetValueExA
FreeSid
CheckTokenMembership
ReportEventW
shell32
SHGetFolderPathW
ShellExecuteW
bcrypt
BCryptGenRandom
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 458KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ