Static task
static1
Behavioral task
behavioral1
Sample
e636738caf458670b2a082dd9935745d95abffa8cdf346073e9bad3b3e4e21a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e636738caf458670b2a082dd9935745d95abffa8cdf346073e9bad3b3e4e21a3.exe
Resource
win10v2004-20220812-en
General
-
Target
e636738caf458670b2a082dd9935745d95abffa8cdf346073e9bad3b3e4e21a3
-
Size
198KB
-
MD5
54bf12db7846fe5ef35b6c5d5d073187
-
SHA1
d62ffe23dc399b7faf938b148c5bf0108ecb4ae0
-
SHA256
e636738caf458670b2a082dd9935745d95abffa8cdf346073e9bad3b3e4e21a3
-
SHA512
1405e6691d073aba977beef29968c680a37baa5d2b23f6157febdd556e86fffbbe2d36b461691a7fa564db97bb56d6c46dfcfd8d791464bb62d5d38dac787f78
-
SSDEEP
6144:sWnqdocdsCvhO27LbUCaW+Dtnnx4GweFn+BZu:sAqdOCvpYCartp0E
Malware Config
Signatures
Files
-
e636738caf458670b2a082dd9935745d95abffa8cdf346073e9bad3b3e4e21a3.exe windows x86
d57d665b564c2556772604ea8c64c214
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_mbschr
_getcwd
memcpy
__getmainargs
__p__fmode
__setusermatherr
_cexit
_ismbblead
_adjust_fdiv
__set_app_type
strstr
_initterm
_controlfp
?terminate@@YAXXZ
_mbsicmp
_mbsinc
strchr
_mbsupr
_acmdln
_exit
_mbscmp
malloc
memmove
memset
strtok
exit
_mbsstr
__p__commode
_access
_XcptFilter
_amsg_exit
kernel32
GetCurrentThreadId
Sleep
lstrcpyA
SetFileAttributesA
GetSystemTimeAsFileTime
MoveFileExA
lstrcpynA
GetCurrentProcess
SetFilePointer
QueryPerformanceCounter
GetFileType
GetSystemDirectoryA
GetProcAddress
FindNextFileA
GlobalAlloc
GetCommandLineW
GetWindowsDirectoryA
DeleteFileA
GetACP
FreeLibrary
lstrlenA
InterlockedCompareExchange
RemoveDirectoryA
CloseHandle
GetFileSize
GetVersionExA
GetPrivateProfileStringA
CreateProcessA
GetShortPathNameA
LoadLibraryA
GetVersion
GetModuleHandleA
FindFirstFileA
SetUnhandledExceptionFilter
UnmapViewOfFile
TerminateProcess
CreateDirectoryA
FindClose
WaitForSingleObject
GetTickCount
SetEndOfFile
GetProcessHeap
VirtualProtect
GlobalFree
GetExitCodeProcess
GetCommandLineA
lstrcatA
GetStartupInfoA
GetCurrentProcessId
UnhandledExceptionFilter
GetLastError
InterlockedExchange
MapViewOfFile
CreateFileMappingA
CreateFileA
setupapi
SetupDiCallClassInstaller
SetupDiGetDeviceRegistryPropertyA
SetupDiDeleteDeviceInfo
SetupDiEnumDeviceInfo
SetupDiOpenDevRegKey
SetupDiGetClassDevsA
advapi32
RegEnumKeyExA
FreeSid
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegDeleteKeyA
OpenServiceA
OpenSCManagerA
RegDeleteValueA
AllocateAndInitializeSid
RegSetValueExA
LookupPrivilegeValueA
RegCloseKey
RegQueryValueExA
DeleteService
ControlService
GetTokenInformation
CloseServiceHandle
EqualSid
user32
ExitWindowsEx
MessageBoxA
LoadIconA
FindWindowA
wsprintfA
LoadStringA
SendMessageA
ntdll
RtlUnwind
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ