Static task
static1
Behavioral task
behavioral1
Sample
e84536a383ab8de9eef4fc1de7c8ca9789eff63607e391c1675d7361001d9adc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e84536a383ab8de9eef4fc1de7c8ca9789eff63607e391c1675d7361001d9adc.exe
Resource
win10v2004-20221111-en
General
-
Target
e84536a383ab8de9eef4fc1de7c8ca9789eff63607e391c1675d7361001d9adc
-
Size
220KB
-
MD5
30a40333ce4d0efa15b594b097acafbd
-
SHA1
d581eed6601b8eb06ef9875a82676aa98ae5cc05
-
SHA256
e84536a383ab8de9eef4fc1de7c8ca9789eff63607e391c1675d7361001d9adc
-
SHA512
c2b2b623cbd1474cdfdf790ce658b02a27bd2e39c2d206899aedb3970f53e849c7672191d6c6b0ac6eaf9b51964a833d573ad3af5602a71d3ac9d6df204229b0
-
SSDEEP
6144:kLs3X9kTRpnC/wV3IUgS4ksL2+pRAK9pX:kEXeTvC4ZzgSUrp19pX
Malware Config
Signatures
Files
-
e84536a383ab8de9eef4fc1de7c8ca9789eff63607e391c1675d7361001d9adc.exe windows x86
d0ac94782741dd616fb0e60580b4fe20
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteProcessMemory
WriteFile
WinExec
WaitForSingleObject
VirtualProtectEx
VirtualFree
VirtualAllocEx
VirtualAlloc
TerminateThread
TerminateProcess
Sleep
SetThreadPriority
SetThreadContext
SetPriorityClass
SetFileTime
SetFilePointer
SetFileAttributesA
ResumeThread
RemoveDirectoryA
ReadProcessMemory
ReadFile
OpenProcess
LoadLibraryA
GlobalUnlock
GlobalMemoryStatus
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetTickCount
GetThreadPriority
GetThreadContext
GetTempPathA
GetSystemDirectoryA
GetProcAddress
GetPriorityClass
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceExA
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
FindNextFileA
FindFirstFileA
FindClose
ExitThread
ExitProcess
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualProtect
GetModuleFileNameA
ExitProcess
user32
GetKeyboardType
MessageBoxA
CharNextA
keybd_event
TranslateMessage
SendMessageA
ReleaseDC
PostMessageA
OpenClipboard
MessageBoxA
IsWindowVisible
GetWindowTextA
GetSystemMetrics
GetWindow
GetMessageA
GetForegroundWindow
GetDesktopWindow
GetDC
GetClipboardData
FindWindowExA
FindWindowA
ExitWindowsEx
EnumDisplaySettingsA
DispatchMessageA
CloseClipboard
CharLowerA
CharUpperA
MessageBoxA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
OpenEventLogA
LookupPrivilegeValueA
GetUserNameA
GetTokenInformation
FreeSid
EqualSid
CloseEventLog
ClearEventLogA
AllocateAndInitializeSid
AdjustTokenPrivileges
DeleteService
ControlService
StartServiceA
OpenServiceA
CloseServiceHandle
EnumServicesStatusA
OpenSCManagerA
oleaut32
SysFreeString
SysReAllocStringLen
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
WNetCancelConnection2A
WNetAddConnection2A
gdi32
SelectObject
GetObjectA
GetDeviceCaps
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
wsock32
WSACleanup
WSAStartup
WSAGetLastError
gethostname
gethostbyname
socket
send
select
recv
ntohs
listen
ioctlsocket
inet_ntoa
inet_addr
htons
getsockname
getpeername
connect
closesocket
bind
accept
winmm
mciSendStringA
shell32
ShellExecuteA
ntdll
ZwUnmapViewOfSection
NtQuerySystemInformation
RtlCompressBuffer
RtlGetCompressionWorkSpaceSize
avicap32
capCreateCaptureWindowA
psapi
GetModuleFileNameExA
wininet
InternetGetConnectedState
Sections
CODE Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 228B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 2KB - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8B - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 68B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ