Static task
static1
Behavioral task
behavioral1
Sample
eb0c88f62a3cb18a6af62dba33a3c842c73d8d8e1fa61a60525690ee3961401a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb0c88f62a3cb18a6af62dba33a3c842c73d8d8e1fa61a60525690ee3961401a.exe
Resource
win10v2004-20220812-en
General
-
Target
eb0c88f62a3cb18a6af62dba33a3c842c73d8d8e1fa61a60525690ee3961401a
-
Size
300KB
-
MD5
9129017b44644a35f4d8afb208a8493f
-
SHA1
58c60d0e7109a8e0641d27b815633127cd504c37
-
SHA256
eb0c88f62a3cb18a6af62dba33a3c842c73d8d8e1fa61a60525690ee3961401a
-
SHA512
db57ef477d144b9cdcf452c6a956f3ec16d19ed2542accc0b6b841f55b3fb5b808c509a007222c4dd76d75261ba11e4409c4907291663ac2c68e9ac7f7499f0b
-
SSDEEP
6144:A0tjcCgD/TYj7+Crk4XJ8DI+sBia+rMLHCE9VX8Y7hArssjP:A0tjGDL/QJ8D7sP+r/IVXW
Malware Config
Signatures
Files
-
eb0c88f62a3cb18a6af62dba33a3c842c73d8d8e1fa61a60525690ee3961401a.exe windows x86
b618d6a14874cc5256d6d79ca3bf21e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationW
SHCreateDirectoryExW
SHGetSpecialFolderLocation
comdlg32
GetOpenFileNameA
oleaut32
VariantClear
gdi32
GetObjectType
RemoveFontResourceA
CreatePen
GetMetaFileBitsEx
ScaleWindowExtEx
Polyline
ole32
PropVariantClear
ProgIDFromCLSID
OleQueryLinkFromData
OleCreateLinkFromData
kernel32
ExpandEnvironmentStringsA
IsValidCodePage
OpenFileMappingW
MapViewOfFile
EnumResourceNamesW
GetFileTime
LockResource
MulDiv
EnumResourceLanguagesA
WriteConsoleA
GetLastError
CreateTimerQueueTimer
WritePrivateProfileStringW
GetTempPathA
WriteFile
GetVersionExW
Beep
CreateFileA
LocalFileTimeToFileTime
lstrcpynW
GetLongPathNameW
GetFileType
GetFileAttributesExW
GlobalFlags
CreateProcessW
GetSystemInfo
lstrlenW
GetConsoleOutputCP
ReadFile
GetDiskFreeSpaceW
IsDBCSLeadByte
CompareStringW
GetComputerNameA
WritePrivateProfileStringA
GetModuleFileNameA
SetThreadPriority
GetSystemDirectoryA
CopyFileA
WaitForSingleObject
FormatMessageA
WinExec
TlsSetValue
OutputDebugStringW
TerminateProcess
CreateMutexA
SearchPathW
GetDateFormatA
lstrcpyW
DeleteFileW
OutputDebugStringA
GetStringTypeW
_lread
SetFileAttributesA
MoveFileA
FormatMessageW
HeapSize
FindResourceW
Sleep
GetFileAttributesA
GetFileSizeEx
GetStartupInfoW
GetProcessAffinityMask
InterlockedCompareExchange
TransactNamedPipe
GetUserDefaultUILanguage
FindFirstFileA
Process32NextW
GetStringTypeA
GetStringTypeExW
GetLogicalDriveStringsW
TerminateThread
IsDBCSLeadByteEx
HeapAlloc
VerifyVersionInfoW
DeleteFileA
GlobalLock
GetFullPathNameW
CreateEventA
GetWindowsDirectoryA
CreateDirectoryA
GlobalMemoryStatus
GlobalDeleteAtom
GetCommandLineW
IsProcessorFeaturePresent
GetTempPathW
lstrcmpiW
OpenMutexA
DuplicateHandle
OpenEventW
FindNextChangeNotification
GetDiskFreeSpaceA
VirtualAlloc
LoadLibraryA
HeapReAlloc
GetOEMCP
GetCPInfo
LeaveCriticalSection
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetExitCodeProcess
GetACP
EnterCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
TlsGetValue
SetLastError
TlsAlloc
GetCurrentThreadId
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
GetProcAddress
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
comctl32
ImageList_GetBkColor
ImageList_DragLeave
version
GetFileVersionInfoA
shlwapi
PathFindExtensionA
PathRemoveExtensionW
PathFileExistsA
advapi32
OpenServiceW
RegEnumValueA
GetSecurityInfo
ImpersonateSelf
ControlService
GetSecurityDescriptorOwner
CryptAcquireContextW
MakeAbsoluteSD
RegOpenKeyExA
SetServiceStatus
GetLengthSid
ConvertSidToStringSidW
user32
GetMessageA
PtInRect
VkKeyScanA
FlashWindow
CheckDlgButton
DefFrameProcA
IsZoomed
SetWindowPlacement
GetClientRect
OpenIcon
SetDlgItemTextA
SetWindowRgn
OemToCharA
DestroyAcceleratorTable
KillTimer
EnumClipboardFormats
UnregisterClassA
GetInputState
SetParent
DrawFrameControl
CopyImage
EndPaint
EnableMenuItem
wsprintfW
RegisterClassExA
IsCharAlphaW
IsClipboardFormatAvailable
FrameRect
SetDlgItemTextW
DestroyCaret
RegisterClassExW
ScrollDC
InvalidateRgn
SetWindowTextW
EmptyClipboard
ValidateRgn
DrawTextExA
GetClassInfoExA
SetActiveWindow
IsIconic
InsertMenuA
GetWindow
UpdateLayeredWindow
AppendMenuA
WaitForInputIdle
SetMenuItemInfoA
DrawEdge
ShowWindow
RegisterClipboardFormatA
MapVirtualKeyA
LoadIconW
UnregisterClassW
GetClassInfoW
GetMenuItemCount
CreatePopupMenu
GetMenuItemID
UnregisterDeviceNotification
HideCaret
LoadImageA
GetSystemMenu
SetWindowsHookExW
EnableWindow
GetWindowTextA
CharLowerW
IsWindow
DdeFreeStringHandle
LoadMenuA
LoadIconA
IsRectEmpty
SetWindowPos
GetUserObjectInformationW
CharPrevW
OffsetRect
GetNextDlgGroupItem
GetParent
GetSysColorBrush
MonitorFromPoint
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ