Static task
static1
Behavioral task
behavioral1
Sample
e375ab068a3fc7115facfbc9fa916fb0373dd012d3c9cf8cd9700366f1635942.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e375ab068a3fc7115facfbc9fa916fb0373dd012d3c9cf8cd9700366f1635942.exe
Resource
win10v2004-20221111-en
General
-
Target
e375ab068a3fc7115facfbc9fa916fb0373dd012d3c9cf8cd9700366f1635942
-
Size
292KB
-
MD5
7ddf4ce0958dfbb2e3038d43ec0ebe0c
-
SHA1
d6fb734ceee8ca2c0e5f62e7435bb3e58ce44120
-
SHA256
e375ab068a3fc7115facfbc9fa916fb0373dd012d3c9cf8cd9700366f1635942
-
SHA512
96bf2225b03fcc60da1fd8392efcb93c3d012fc1b2927b4bbe6770cbc055fda5a45ae4a13ddc962cd15c9dc07a43b8ea9a4a8eb469be9b3d7684addd157a3059
-
SSDEEP
6144:7URjo1XtCDv+F3ebRn+W1S58B3ctVR6AS61LrCk6lH06z5:7Mj6qAeln+Wj3EVR6AS6E2a
Malware Config
Signatures
Files
-
e375ab068a3fc7115facfbc9fa916fb0373dd012d3c9cf8cd9700366f1635942.exe windows x86
593d22c343ed11d54d4e40a1fb10a2c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessWorkingSetSize
InitializeCriticalSection
GetLocaleInfoW
OpenMutexA
SetVolumeLabelA
_lopen
GetStringTypeExW
OutputDebugStringW
ExitProcess
GetOverlappedResult
IsValidLocale
CreateNamedPipeW
SetEndOfFile
VirtualLock
WritePrivateProfileSectionW
VirtualProtect
GetModuleHandleA
PurgeComm
GetBinaryTypeA
GetCommandLineW
LocalSize
VirtualAllocEx
lstrcmpiA
CreateEventA
MoveFileExA
FindFirstFileExW
GetFullPathNameA
FindCloseChangeNotification
IsProcessorFeaturePresent
TlsGetValue
OpenFile
GetSystemDirectoryW
SetProcessAffinityMask
GetModuleFileNameW
_llseek
SetStdHandle
UnmapViewOfFile
VirtualQueryEx
GetProfileIntA
GetLongPathNameA
GetShortPathNameA
LocalFileTimeToFileTime
SetThreadAffinityMask
GetSystemTimeAsFileTime
WritePrivateProfileStringA
GetProcessTimes
SetConsoleOutputCP
ConnectNamedPipe
SwitchToFiber
GlobalDeleteAtom
SetLastError
GetComputerNameW
SetConsoleTitleA
GetTempPathW
VirtualFree
GetStartupInfoA
WriteProcessMemory
UnhandledExceptionFilter
GetVersion
DebugBreak
GetConsoleCursorInfo
PeekNamedPipe
lstrcmpiW
GetConsoleMode
PulseEvent
PrepareTape
SetConsoleActiveScreenBuffer
RemoveDirectoryW
SetCommMask
GetPrivateProfileSectionW
GetDriveTypeW
FillConsoleOutputCharacterA
GetHandleInformation
lstrlenA
SetTimeZoneInformation
VirtualAlloc
user32
SwapMouseButton
GetCaretBlinkTime
SetPropA
LoadImageW
FlashWindowEx
UnhookWindowsHook
DestroyCursor
keybd_event
SetWindowContextHelpId
GetUserObjectInformationA
GetMenuDefaultItem
CharUpperBuffA
GetDoubleClickTime
GetMessageTime
PostMessageW
SetSysColors
SetWindowsHookExA
CharUpperW
GetDlgCtrlID
GetClipboardFormatNameA
GetClassInfoA
ClipCursor
LookupIconIdFromDirectory
MapDialogRect
GetDC
GetWindowDC
GetScrollRange
CopyAcceleratorTableW
GetIconInfo
IsCharLowerA
SubtractRect
SetWindowRgn
BroadcastSystemMessageW
WindowFromDC
InvertRect
TrackMouseEvent
VkKeyScanA
CopyAcceleratorTableA
InsertMenuItemA
UnhookWindowsHookEx
GetMessageExtraInfo
SetClassLongA
SetWindowPlacement
RemovePropW
DrawTextA
ToUnicodeEx
GetTabbedTextExtentA
DrawTextW
EqualRect
SetWindowLongA
GetMenuStringW
LoadAcceleratorsA
DefWindowProcA
GetUpdateRgn
CloseClipboard
GetWindowInfo
SetMenuItemInfoW
GetActiveWindow
SendDlgItemMessageW
WindowFromPoint
gdi32
GetTextExtentExPointA
PolyDraw
Rectangle
GetCurrentPositionEx
SetViewportOrgEx
FrameRgn
SetGraphicsMode
SetTextColor
TextOutW
SetBkColor
Pie
PlayEnhMetaFile
ExtSelectClipRgn
ResizePalette
EnumFontsA
CreateRectRgn
CreateDIBitmap
GetDeviceCaps
GetSystemPaletteUse
advapi32
ChangeServiceConfigA
RegEnumKeyExA
GetNamedSecurityInfoA
GetExplicitEntriesFromAclW
StartServiceA
GetTokenInformation
EnumDependentServicesA
CreatePrivateObjectSecurity
AbortSystemShutdownA
RegRestoreKeyW
GetSecurityInfo
OpenServiceA
RegSetValueA
InitiateSystemShutdownA
AdjustTokenPrivileges
QueryServiceObjectSecurity
GetAclInformation
CryptVerifySignatureW
GetAce
GetServiceDisplayNameW
RegDeleteValueW
RegDeleteKeyA
SetNamedSecurityInfoW
ImpersonateLoggedOnUser
RegDeleteValueA
RegOpenKeyExW
LookupPrivilegeDisplayNameA
EnumServicesStatusW
OpenThreadToken
RegOpenKeyExA
ChangeServiceConfigW
CryptGetHashParam
CryptDestroyKey
DuplicateTokenEx
shell32
SHFileOperationW
FindExecutableA
ExtractIconA
ole32
CoRegisterMallocSpy
OleSetMenuDescriptor
oleaut32
QueryPathOfRegTypeLi
comctl32
ImageList_Create
CreateStatusWindowW
shlwapi
PathIsDirectoryA
StrRStrIW
PathRemoveFileSpecW
SHGetValueA
SHOpenRegStream2W
UrlIsW
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE