Static task
static1
Behavioral task
behavioral1
Sample
eb44f8b7a91811a333b337b17d56ae20eaff82dde7a7e1ed056b340bd1c0691d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb44f8b7a91811a333b337b17d56ae20eaff82dde7a7e1ed056b340bd1c0691d.exe
Resource
win10v2004-20220812-en
General
-
Target
eb44f8b7a91811a333b337b17d56ae20eaff82dde7a7e1ed056b340bd1c0691d
-
Size
482KB
-
MD5
64aeaed7378ffe6fce99e637425ffe00
-
SHA1
2c4969820305def9178bc6ebf5a67a38abc1f91c
-
SHA256
eb44f8b7a91811a333b337b17d56ae20eaff82dde7a7e1ed056b340bd1c0691d
-
SHA512
8b49139fdc46f4d3b3ac84efd14393ead3431f75b4d3125a85ed6134f5ebfcc785e28fe1290ebb4b352994024c77120dcd90a14cd48c52dcc5fb3d705bc35dbb
-
SSDEEP
6144:T7TmkiFFGlQeheDzu+1RIlpZm0iR6mTAWFxLdDq:T7afihevX1mlpZm0i1fz0
Malware Config
Signatures
Files
-
eb44f8b7a91811a333b337b17d56ae20eaff82dde7a7e1ed056b340bd1c0691d.exe windows x86
be61c3044324743a18ffa0ec4326f89d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
RegisterClassExA
DefDlgProcA
GetSysColor
LoadIconA
SetTimer
ShowWindow
SetForegroundWindow
CharLowerA
CharUpperA
CharNextA
EnableWindow
DialogBoxParamA
SetDlgItemTextA
EndDialog
GetDlgItem
SendDlgItemMessageA
SetWindowPos
GetDesktopWindow
GetWindowRect
MoveWindow
SendMessageA
GetForegroundWindow
MessageBoxExA
FindWindowA
GetProcessDefaultLayout
IsZoomed
NotifyWinEvent
GetTopWindow
IsCharAlphaNumericA
GetWindowLongW
DrawIcon
MapVirtualKeyExW
GetDlgCtrlID
shell32
ShellExecuteA
Shell_NotifyIconA
advapi32
QueryServiceStatus
StartServiceA
RegDeleteKeyA
CloseServiceHandle
GetUserNameA
LockServiceDatabase
UnlockServiceDatabase
ChangeServiceConfigA
OpenServiceA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
DeleteService
ControlService
OpenSCManagerA
gdi32
SetTextColor
CreateFontA
CreateSolidBrush
GetGraphicsMode
ExtSelectClipRgn
PolylineTo
ResetDCW
GetObjectA
CreatePolygonRgn
GetOutlineTextMetricsW
EnumObjects
OffsetClipRgn
ExtTextOutW
SetRectRgn
GetBrushOrgEx
SetBkMode
comctl32
InitCommonControlsEx
kernel32
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapFree
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
IsValidCodePage
GetWriteWatch
DisconnectNamedPipe
GetProcessIoCounters
SetCommMask
ReplaceFileA
HeapAlloc
GetProcessHeap
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ