Static task
static1
Behavioral task
behavioral1
Sample
ea92122dc17685a7a16349436f04c4643435881ca9658318e2194758840f89f8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea92122dc17685a7a16349436f04c4643435881ca9658318e2194758840f89f8.exe
Resource
win10v2004-20220901-en
General
-
Target
ea92122dc17685a7a16349436f04c4643435881ca9658318e2194758840f89f8
-
Size
197KB
-
MD5
4d8e1fc33d93f7c2d3a3166e67639992
-
SHA1
955cb2e659511d6ac031c2b1a96f105bcebc7dd6
-
SHA256
ea92122dc17685a7a16349436f04c4643435881ca9658318e2194758840f89f8
-
SHA512
4ed88670d4da73b6b0f34427625d559ed1482addf45e45beb1695be3b7d9535ab3ba8490854bb7203c827598da4cc002544a288eccef2eb290e0d81d04054112
-
SSDEEP
3072:LVHap+arJxGCKOpb+cMh0tcxW0r4MZ8NlV4OmfOcRdMj0qegl44kVS1eWDTTeGNq:qjwcMh0tcU0D+l6NfOG2Vfl442SA6
Malware Config
Signatures
Files
-
ea92122dc17685a7a16349436f04c4643435881ca9658318e2194758840f89f8.exe windows x86
5d8d4ff4cff8afd471244fbcc940d22c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
log10
memcpy
calloc
user32
GetActiveWindow
GetParent
GetCursor
GetMenuState
GetSysColor
GetScrollInfo
GetWindowTextA
GetMenuItemInfoA
IsWindowVisible
GetFocus
GetSubMenu
GetSysColorBrush
IsWindowEnabled
kernel32
GetTickCount
GetEnvironmentStrings
GetDiskFreeSpaceA
SetThreadLocale
FindClose
GetCPInfo
FindResourceA
SetHandleCount
Sleep
CompareStringA
GlobalAddAtomA
VirtualAllocEx
MulDiv
SizeofResource
HeapDestroy
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSection
CreateThread
GetLocalTime
GetStringTypeA
WaitForSingleObject
GetLastError
FreeResource
GetFullPathNameA
SetEvent
GetSystemDefaultLangID
FreeLibrary
SetErrorMode
SetFilePointer
GetLocaleInfoA
GetFileType
GetModuleHandleA
GetCurrentThread
WriteFile
HeapAlloc
ResetEvent
LocalReAlloc
GetVersion
GetProcessHeap
GetVersionExA
EnumCalendarInfoA
VirtualFree
GetFileSize
GetCurrentProcessId
LoadResource
GetModuleFileNameA
ExitProcess
GetOEMCP
GetUserDefaultLCID
GetCommandLineA
lstrlenA
GlobalAlloc
RaiseException
GetThreadLocale
GlobalDeleteAtom
SetLastError
GetCurrentProcess
CreateEventA
lstrcpyA
DeleteFileA
GetFileAttributesA
GetStartupInfoA
lstrcpynA
LocalAlloc
CreateFileA
DeleteCriticalSection
LoadLibraryA
GetACP
HeapFree
FindFirstFileA
lstrcmpA
GetStdHandle
ReadFile
CloseHandle
LocalFree
EnterCriticalSection
VirtualQuery
VirtualAlloc
GlobalFindAtomA
GetCurrentThreadId
lstrcatA
LockResource
FormatMessageA
MoveFileExA
Sections
CODE Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE