Static task
static1
Behavioral task
behavioral1
Sample
e63552d73d02f789f33f835be4dd16fe9f682928277d6d4cff750a8a7ca66380.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e63552d73d02f789f33f835be4dd16fe9f682928277d6d4cff750a8a7ca66380.exe
Resource
win10v2004-20220812-en
General
-
Target
e63552d73d02f789f33f835be4dd16fe9f682928277d6d4cff750a8a7ca66380
-
Size
5.2MB
-
MD5
5def491d2cc25c24765d897843226210
-
SHA1
b00494f3ccfa755e397cc612ed5950443adb6829
-
SHA256
e63552d73d02f789f33f835be4dd16fe9f682928277d6d4cff750a8a7ca66380
-
SHA512
443c78b4b73c6eb616243e492e2a3f23a4f852176c8116301ff31165fea2fdd37f5b6decf5d57479b0601ebc1a52edc041f4508a1a8ef66603a9e96efc3564a4
-
SSDEEP
98304:8SE+g/0RG5QgPY4codEyupXapyNfmhlyDVdGuJej1EHy77sxYvrBEyNPjuchp0q+:dg/0RG5+oI6S+mD0osAxYvraiaC2qa4K
Malware Config
Signatures
Files
-
e63552d73d02f789f33f835be4dd16fe9f682928277d6d4cff750a8a7ca66380.exe windows x86
5c0345dc75ea177c8c20c62573d5f0ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlUnwind
RtlZeroMemory
RtlGetNtVersionNumbers
RtlMoveMemory
RtlCompareMemory
shlwapi
PathFindFileNameA
StrChrA
wininet
HttpOpenRequestA
InternetCheckConnectionA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetReadFile
HttpSendRequestA
kernel32
SetEndOfFile
HeapReAlloc
HeapSize
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
RemoveDirectoryA
SetFileAttributesA
GetTempPathA
GetVolumeInformationA
GetLastError
SetErrorMode
HeapAlloc
HeapFree
GetProcessHeap
CreateMutexA
Sleep
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalReAlloc
GlobalSize
GlobalUnlock
GlobalLock
WriteConsoleW
WinExec
lstrcpyA
lstrlenA
GetComputerNameA
MultiByteToWideChar
WideCharToMultiByte
CreateFileA
GetFileInformationByHandle
GetFileSize
ReadFile
SetFilePointer
WriteFile
CloseHandle
GetLocalTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
FileTimeToSystemTime
SystemTimeToFileTime
SetFilePointerEx
IsValidCodePage
FindNextFileW
FindFirstFileExW
LCMapStringW
CompareStringW
GetTimeZoneInformation
GlobalFree
DecodePointer
ReadConsoleW
GetConsoleMode
SetStdHandle
GetFileSizeEx
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateFileW
GetFileType
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetConsoleCP
user32
IsClipboardFormatAvailable
EmptyClipboard
RegisterClipboardFormatA
GetClipboardData
SetClipboardData
GetDesktopWindow
SetClipboardViewer
CloseClipboard
OpenClipboard
EndDialog
DialogBoxIndirectParamA
SendMessageA
UnregisterHotKey
ChangeClipboardChain
RegisterHotKey
advapi32
GetUserNameA
shell32
ShellExecuteA
SHGetFolderPathA
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 571KB - Virtual size: 574KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ