Static task
static1
Behavioral task
behavioral1
Sample
e0f10eafd519145dfa02bbdea55e0de3a2f53aeeb0974734118ff0f6c1b9c243.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0f10eafd519145dfa02bbdea55e0de3a2f53aeeb0974734118ff0f6c1b9c243.exe
Resource
win10v2004-20220812-en
General
-
Target
e0f10eafd519145dfa02bbdea55e0de3a2f53aeeb0974734118ff0f6c1b9c243
-
Size
176KB
-
MD5
5bf68f28c10e19d3c1bda8cc69dc56f5
-
SHA1
8b320671ff9da97a28fb103a00c7b5e132070a0d
-
SHA256
e0f10eafd519145dfa02bbdea55e0de3a2f53aeeb0974734118ff0f6c1b9c243
-
SHA512
77656cbf118a583f69fa6a2bbb48259159112334b69584ee5188c33ec43a94504d8a354c11d7920c2ac5903dbdd2fc3e933d990170586cffca65544d7a26a09c
-
SSDEEP
3072:LfJOXPtFxvOFYlKzJRevwo7lqi9Izjn/3AC16jXA1oR+5M:LfgX7xYYyRevwop8MCMM1oR
Malware Config
Signatures
Files
-
e0f10eafd519145dfa02bbdea55e0de3a2f53aeeb0974734118ff0f6c1b9c243.exe windows x86
b6e231ce00e9a9c5c02cbcacb43b4894
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
SizeofResource
WideCharToMultiByte
SetEvent
ExitThread
lstrcpyA
HeapFree
FreeLibrary
CompareStringA
VirtualAllocEx
lstrcmpA
GetStdHandle
LocalFree
MulDiv
HeapDestroy
lstrcpynA
GetCurrentProcess
GetFileType
GetCurrentProcessId
LoadResource
EnumCalendarInfoA
GetLocaleInfoA
SetHandleCount
GlobalAlloc
GetStringTypeW
GlobalAddAtomA
SetEndOfFile
GetProcAddress
GetFileAttributesA
GetProcessHeap
DeleteCriticalSection
RaiseException
Sleep
GetLastError
GetUserDefaultLCID
GetThreadLocale
EnterCriticalSection
GetVersion
GetCommandLineA
GetSystemDefaultLangID
GetEnvironmentStrings
lstrcmpiA
LockResource
LocalReAlloc
FindFirstFileA
CreateEventA
SetErrorMode
MoveFileExA
GlobalFindAtomA
GetCurrentThread
SetFilePointer
CreateThread
CloseHandle
LocalAlloc
ExitProcess
GetModuleFileNameA
FormatMessageA
GetCPInfo
GetFileSize
FindResourceA
GetStringTypeA
GetLocalTime
DeleteFileA
GetVersionExA
SetLastError
VirtualAlloc
GetTickCount
GlobalDeleteAtom
GetCurrentThreadId
GetDiskFreeSpaceA
LoadLibraryExA
InitializeCriticalSection
GetModuleHandleA
CreateFileA
GetOEMCP
GetACP
WaitForSingleObject
lstrlenA
LoadLibraryA
ResetEvent
VirtualFree
ReadFile
lstrcatA
MoveFileA
SetThreadLocale
VirtualQuery
version
VerInstallFileA
GetFileVersionInfoA
msvcrt
wcschr
wcscspn
memmove
clock
swprintf
wcstol
calloc
sprintf
time
memset
_acmdln
sqrt
ole32
CreateBindCtx
StgOpenStorage
CreateOleAdviseHolder
CoTaskMemFree
CoCreateFreeThreadedMarshaler
CoUnmarshalInterface
CreateStreamOnHGlobal
CoGetContextToken
user32
EnumChildWindows
GetDlgItem
FillRect
GetSubMenu
HideCaret
TrackPopupMenu
SetWindowTextA
EndPaint
CharLowerA
GetScrollRange
GetKeyState
GetIconInfo
GetParent
DispatchMessageA
GetActiveWindow
DrawIcon
GetCursorPos
GetClientRect
EnumWindows
GetMenuItemCount
SetCursor
GetFocus
DefWindowProcA
GetLastActivePopup
GetSysColor
CreateMenu
GetCursor
DefFrameProcA
GetForegroundWindow
IsWindowVisible
ShowScrollBar
DeferWindowPos
CharToOemA
BeginPaint
CharLowerBuffA
ShowWindow
DrawIconEx
FindWindowA
GetWindow
GetPropA
GetScrollInfo
ClientToScreen
SystemParametersInfoA
DrawMenuBar
GetClassLongA
CreatePopupMenu
IsWindowEnabled
SetWindowPos
CreateIcon
GetMenu
GetKeyNameTextA
GetCapture
IsMenu
GetSysColorBrush
SetTimer
DrawFrameControl
GetScrollPos
EnableScrollBar
Sections
.CODE Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 5KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1024B - Virtual size: 867B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE