Static task
static1
Behavioral task
behavioral1
Sample
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe
Resource
win10v2004-20230220-en
General
-
Target
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199
-
Size
75KB
-
MD5
0ea7b7b9e3c9327600e5f6c3d73d3b31
-
SHA1
0e9fa74e170d65cfd2c30dbb97e15ec5d5101d2d
-
SHA256
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199
-
SHA512
ffceee9d663a38c9ec163b3e175d84133f876eb238bff9b7e63deccf661807166900f7e12154db56554e234fb97ff5eed9cd7e3677923669b6449c8f3a881492
-
SSDEEP
768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUdZ:SaX1LGfDpRRuI0PuvtOuSG4PA
Malware Config
Signatures
Files
-
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe windows x64
200928216c27c7644c19b0beec4e3fd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
SysAllocString
SysFreeString
mpr
WNetCancelConnection2W
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
WNetAddConnection2W
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
user32
wsprintfW
netapi32
NetApiBufferFree
NetShareEnum
NetGetJoinInformation
NetGetDCName
ntdll
RtlGetNativeSystemInformation
RtlVirtualUnwind
RtlGetVersion
ZwQuerySystemInformation
advapi32
GetUserNameW
LookupAccountSidW
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
StartServiceW
QueryServiceStatusEx
OpenServiceA
OpenSCManagerW
OpenSCManagerA
EnumServicesStatusA
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
activeds
ord9
msvcrt
feof
fgetws
_getch
fclose
_vsnwprintf
memset
_wfopen
shell32
CommandLineToArgvW
ord680
shlwapi
StrStrIW
SHRegSetUSValueW
StrChrW
StrCmpIW
StrStrIA
StrCmpNIW
kernel32
DeleteFileW
GlobalMemoryStatus
CopyFileW
GetStdHandle
WaitForSingleObject
CreateEventA
CreateThread
GetTickCount64
CreateSemaphoreA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
AllocConsole
WriteConsoleW
GetConsoleScreenBufferInfo
SetFileAttributesW
DeviceIoControl
lstrcmpiW
ResetEvent
TerminateThread
GetFileSizeEx
ReadFile
SetConsoleCursorPosition
GetComputerNameW
lstrcmpiA
GetSystemInfo
CreateProcessW
GetTempPathW
GetModuleFileNameW
SetEndOfFile
OpenProcess
TerminateProcess
GetComputerNameA
lstrlenA
TlsAlloc
SetErrorMode
ExitProcess
ReleaseSemaphore
SetEvent
GetCommandLineW
GetDriveTypeW
TlsSetValue
TlsGetValue
SetFilePointerEx
SetFileInformationByHandle
GetCurrentProcess
HeapAlloc
GetProcessHeap
lstrcpyW
lstrcatW
lstrlenW
FindClose
FindFirstFileW
FindNextFileW
GetVolumeInformationW
GetLastError
HeapFree
CreateFileW
WriteFile
CloseHandle
SetLastError
HeapReAlloc
GetCurrentProcessId
WideCharToMultiByte
Sleep
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.c Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ