Static task
static1
Behavioral task
behavioral1
Sample
e406abb169240f832227beb9748c0aaf272b560ff1e9b64c586eef8079316d87.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e406abb169240f832227beb9748c0aaf272b560ff1e9b64c586eef8079316d87.exe
Resource
win10v2004-20220812-en
General
-
Target
e406abb169240f832227beb9748c0aaf272b560ff1e9b64c586eef8079316d87
-
Size
53KB
-
MD5
433cbb7c4a7fc772d6a052a7b605d044
-
SHA1
655a385a6945df032d8526b9e83f9c39c7a373eb
-
SHA256
e406abb169240f832227beb9748c0aaf272b560ff1e9b64c586eef8079316d87
-
SHA512
2015a9e4084c1decff6dc785b2b1e03369c7ef5bdff7b090387472e0329ae3e0f2f1bca161b0432071a8fa1c3a5eee7d498d73cd36102450151bfa6b11dc97da
-
SSDEEP
768:w3EvR6PyDaCinVnYmd0pnSvPuhxTz5WesTkHjgkFtspDBZHQpa+6AVDo/S:R6/DxV+hxTzkeQejgj/Z6a+6
Malware Config
Signatures
Files
-
e406abb169240f832227beb9748c0aaf272b560ff1e9b64c586eef8079316d87.exe windows x86
ca64958e05ac928816ef5bbd8643d41b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyState
GetDlgItem
OpenDesktopA
SetThreadDesktop
DispatchMessageW
SendMessageW
GetWindowTextW
ExitWindowsEx
MsgWaitForMultipleObjects
GetClassNameW
CloseDesktop
SetProcessWindowStation
GetIconInfo
GetWindowThreadProcessId
PeekMessageA
GetClipboardData
PeekMessageW
GetMessageW
GetDlgItemTextA
FindWindowExW
GetDlgItemTextW
DrawIcon
LoadCursorW
OpenWindowStationA
GetCursorPos
CloseWindowStation
CharLowerBuffA
GetForegroundWindow
ToUnicode
EndDialog
GetKeyboardState
GetMessageA
GetWindowLongW
kernel32
FindClose
GetFileSize
Sleep
HeapReAlloc
WideCharToMultiByte
SetFilePointer
lstrlenW
GetModuleFileNameA
DeleteFileW
lstrcatW
MapViewOfFile
SetThreadPriority
GetExitCodeProcess
lstrcpyW
DisconnectNamedPipe
lstrcmpiW
EnterCriticalSection
MoveFileExW
LeaveCriticalSection
CreateFileMappingW
CreateProcessW
GetVersionExW
ReadFile
GetDriveTypeW
GetFileTime
GlobalLock
GetLastError
SetFileTime
ReleaseMutex
GetComputerNameW
FindResourceW
SetFileAttributesW
GetCurrentProcessId
CreateMutexW
IsBadReadPtr
lstrcpynW
GetModuleFileNameW
lstrcatA
GetFileSizeEx
UnmapViewOfFile
GetUserDefaultUILanguage
CloseHandle
InitializeCriticalSection
GetCommandLineA
GetProcessTimes
GetTimeZoneInformation
SetEndOfFile
WriteProcessMemory
OpenProcess
GetLocalTime
HeapFree
GetTickCount
CreateThread
GetTempPathW
MultiByteToWideChar
GlobalUnlock
CreateDirectoryW
Sections
.zgnox Size: 18KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ezotcz Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jcdgf Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.budmh Size: 26KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ