Static task
static1
Behavioral task
behavioral1
Sample
e264fb8f319c1b5964600dd80423833e6b0ba7d4a8f459e854ea73343cd043fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e264fb8f319c1b5964600dd80423833e6b0ba7d4a8f459e854ea73343cd043fb.exe
Resource
win10v2004-20221111-en
General
-
Target
e264fb8f319c1b5964600dd80423833e6b0ba7d4a8f459e854ea73343cd043fb
-
Size
960KB
-
MD5
47de038b8f1c802dc82d9bf658d5320d
-
SHA1
34c61ca6e4e5b8e0d652ba0f1bc68a764dca0b48
-
SHA256
e264fb8f319c1b5964600dd80423833e6b0ba7d4a8f459e854ea73343cd043fb
-
SHA512
4562a692a055fd35ebb262587ca964570e424ff69a2ae917bde3898217fbfbcdd198812ed490198a3221610fd11ebc848dff6707ecc4faf66598824c68bd0513
-
SSDEEP
24576:UUXuh/FDwDUJ2TTTTKlJSyYBv+ux9loQ3DzBTb:UHFDTEDKvnFAXoeHBn
Malware Config
Signatures
Files
-
e264fb8f319c1b5964600dd80423833e6b0ba7d4a8f459e854ea73343cd043fb.exe windows x86
4ebc77aca7f19ab94b28e538eae69019
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateProcessA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
CompareStringA
GetExitCodeProcess
IsValidCodePage
IsValidLocale
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetVersion
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetOEMCP
GetTickCount
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
GetLastError
LocalFree
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetModuleFileNameW
MoveFileW
CopyFileW
DeleteFileW
GetFileAttributesW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileW
MoveFileA
CopyFileA
GetFileAttributesA
FormatMessageA
GetTempPathA
GetModuleFileNameA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetVersionExA
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
user32
RegisterClassExW
LoadCursorA
DialogBoxParamW
CreateWindowExW
SetWindowPos
OffsetRect
LoadStringW
GetMessageA
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
TranslateMessage
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
GetDlgItemTextW
SetWindowTextW
MoveWindow
SetDlgItemTextW
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
ShellExecuteExW
crypt32
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
CertCloseStore
ws2_32
WSAGetLastError
socket
inet_addr
htons
setsockopt
gethostbyname
connect
WSAStartup
ioctlsocket
select
bind
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegOpenKeyExA
CryptAcquireContextA
CryptReleaseContext
GetUserNameA
RegQueryValueExA
RegCloseKey
CryptGenRandom
oleaut32
SysFreeString
SysAllocString
SysStringLen
Sections
.text Size: 472KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ