Static task
static1
Behavioral task
behavioral1
Sample
eaf429e1407f18f8eff79d492cbdff8c1a988c8ee1d6531033cb2a289365a708.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaf429e1407f18f8eff79d492cbdff8c1a988c8ee1d6531033cb2a289365a708.exe
Resource
win10v2004-20220812-en
General
-
Target
eaf429e1407f18f8eff79d492cbdff8c1a988c8ee1d6531033cb2a289365a708
-
Size
97KB
-
MD5
e3ba7445b7c808be7c9217148bdaf5a0
-
SHA1
b4f70c478ba0c1cddf20c3a6f3dd5b27efdb6f77
-
SHA256
eaf429e1407f18f8eff79d492cbdff8c1a988c8ee1d6531033cb2a289365a708
-
SHA512
a360f220eb7f75111a0d8e5a0be6603e072a3b8581a563d0640611d73fb86985d00abde17518b11acbd4b4435b446a1965d5d89eb5d1659f34e5e1b938037b77
-
SSDEEP
1536:gsy5cUqBIUVb6vr9nkZb7l8C6iZ1pkdvA3yzmgNoqyNRUkwsSpvwB:Q5cZLDZb7lsGzk+3ykqyNWkwss4B
Malware Config
Signatures
Files
-
eaf429e1407f18f8eff79d492cbdff8c1a988c8ee1d6531033cb2a289365a708.exe windows x86
d755b3b819c613d16594266a95dc51a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateFreeThreadedMarshaler
MkParseDisplayName
CoDisconnectObject
StringFromIID
CoReleaseMarshalData
CLSIDFromProgID
OleCreateStaticFromData
OleRegGetUserType
CoGetContextToken
CreateBindCtx
comctl32
ImageList_GetBkColor
ImageList_Add
ImageList_Write
ImageList_Destroy
ImageList_Draw
ImageList_Create
ImageList_DragShowNolock
ImageList_Read
ImageList_DrawEx
msvcrt
malloc
log
memmove
memcpy
calloc
user32
CharUpperBuffA
EnumChildWindows
ChildWindowFromPoint
GetSysColor
SetWindowLongA
SetActiveWindow
ShowScrollBar
ScreenToClient
InsertMenuItemA
RegisterClipboardFormatA
GetWindowTextA
GetMenu
LoadCursorA
DeleteMenu
TranslateMDISysAccel
IsZoomed
GetCursor
SetParent
SetMenuItemInfoA
CharLowerA
CallWindowProcA
SystemParametersInfoA
GetMessagePos
CreateMenu
PeekMessageW
SetTimer
FillRect
RedrawWindow
KillTimer
GetParent
GetClassLongA
WindowFromPoint
GetScrollPos
SetScrollPos
GetDesktopWindow
InflateRect
PostMessageA
IsIconic
GetWindowRect
GetCapture
GetScrollInfo
IsWindow
DrawEdge
GetTopWindow
GetWindowPlacement
FindWindowA
GetMenuItemInfoA
InsertMenuA
DefMDIChildProcA
TranslateMessage
GetMenuStringA
ScrollWindow
GetClassInfoA
GetWindowLongW
GetWindow
GetClipboardData
DrawFrameControl
EnableWindow
CreatePopupMenu
GetWindowDC
PtInRect
SetMenu
SetRect
DrawIcon
GetSysColorBrush
DispatchMessageW
GetMenuState
SetWindowPos
DrawAnimatedRects
IntersectRect
SetPropA
GetDCEx
SetWindowsHookExA
EnableMenuItem
WaitMessage
ActivateKeyboardLayout
SetScrollInfo
LoadBitmapA
SetWindowPlacement
EmptyClipboard
SetForegroundWindow
RemoveMenu
GetKeyboardType
DestroyCursor
GetFocus
IsWindowVisible
SetFocus
GetKeyboardLayout
PostQuitMessage
AdjustWindowRectEx
ReleaseCapture
CharNextA
GetActiveWindow
GetWindowLongA
MoveWindow
LoadStringA
GetClassNameA
OpenClipboard
IsDialogMessageW
LoadKeyboardLayoutA
MapWindowPoints
SendMessageW
DrawMenuBar
CharNextW
EqualRect
GetKeyboardState
RegisterClassA
DispatchMessageA
wsprintfA
EnumWindows
DrawIconEx
DrawTextA
GetKeyboardLayoutNameA
GetKeyNameTextA
CharToOemA
CreateWindowExA
ClientToScreen
CloseClipboard
CallNextHookEx
GetForegroundWindow
DestroyWindow
MapVirtualKeyA
RegisterWindowMessageA
TrackPopupMenu
GetWindowThreadProcessId
GetMenuItemID
OffsetRect
SetClipboardData
GetKeyboardLayoutList
ShowOwnedPopups
SendMessageA
UnhookWindowsHookEx
DefFrameProcA
InvalidateRect
GetCursorPos
ReleaseDC
UpdateWindow
IsWindowUnicode
DefWindowProcA
MessageBeep
GetIconInfo
IsWindowEnabled
UnregisterClassA
MessageBoxA
GetSystemMetrics
EnumThreadWindows
FrameRect
IsRectEmpty
SetScrollRange
OemToCharA
SetClassLongA
CharLowerBuffA
GetLastActivePopup
SetWindowTextA
SetCursor
SetCapture
DestroyMenu
BeginPaint
LoadIconA
RemovePropA
GetClientRect
CreateIcon
EndPaint
PeekMessageA
MsgWaitForMultipleObjects
GetPropA
GetMenuItemCount
GetScrollRange
IsChild
ShowWindow
DestroyIcon
CheckMenuItem
IsDialogMessageA
version
GetFileVersionInfoSizeA
kernel32
GlobalDeleteAtom
GetFileType
GetStringTypeA
GetCommandLineA
lstrlenA
GetThreadLocale
CompareStringA
WideCharToMultiByte
lstrcpynA
ExitThread
DeleteFileA
MoveFileA
Sleep
GetStdHandle
GetCurrentProcess
ExitProcess
HeapDestroy
CloseHandle
lstrcmpiA
GetLastError
GetStringTypeW
GetCurrentThread
LoadResource
FreeResource
GetCurrentProcessId
GetEnvironmentStrings
MoveFileExA
GetVersionExA
CreateFileA
GetCPInfo
GetModuleHandleA
GetDiskFreeSpaceA
GlobalFindAtomA
LockResource
MulDiv
SetErrorMode
GetTickCount
GetStartupInfoA
SetHandleCount
SetEndOfFile
VirtualQuery
GetProcAddress
DeleteCriticalSection
SetFilePointer
FindClose
VirtualAlloc
GetOEMCP
lstrcmpA
GetCurrentThreadId
SetLastError
WaitForSingleObject
RaiseException
GetACP
GetLocalTime
LoadLibraryExA
GetLocaleInfoA
GlobalAlloc
SetThreadLocale
ResetEvent
FindFirstFileA
FormatMessageA
EnumCalendarInfoA
CreateThread
FreeLibrary
EnterCriticalSection
GetFileSize
GetSystemDefaultLangID
GetModuleFileNameA
LocalFree
CreateEventA
GetFullPathNameA
HeapAlloc
VirtualAllocEx
GetDateFormatA
VirtualFree
SetEvent
LocalAlloc
InitializeCriticalSection
GetVersion
lstrcpyA
lstrcatA
GetFileAttributesA
SizeofResource
WriteFile
ReadFile
HeapFree
FindResourceA
LoadLibraryA
GetUserDefaultLCID
GlobalAddAtomA
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ