Static task
static1
Behavioral task
behavioral1
Sample
eeb1bb5b880872a5f23efa0fede496b70e9b1c67fa13eade4e0b83784ede917f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eeb1bb5b880872a5f23efa0fede496b70e9b1c67fa13eade4e0b83784ede917f.exe
Resource
win10v2004-20220812-en
General
-
Target
eeb1bb5b880872a5f23efa0fede496b70e9b1c67fa13eade4e0b83784ede917f
-
Size
74KB
-
MD5
c0e94cd2759810d62a573f3c7a68ac3d
-
SHA1
d97af07ac4debebc439a5e5c02903ef8258b96bb
-
SHA256
eeb1bb5b880872a5f23efa0fede496b70e9b1c67fa13eade4e0b83784ede917f
-
SHA512
761269363e517c6f088a587a0d527f85092f902cef4e19e00351357fefd5e0994bc7d87246d323853df7b55e6bed169e80aa0adec779775d0c9a65f844c0d39b
-
SSDEEP
1536:EhFyNfztB02k1jwO+m3XXyf7PzmwDvuZPiNNXkXrMXaYi3aU:vNbTYj7+B1NXkXrMXaYiKU
Malware Config
Signatures
Files
-
eeb1bb5b880872a5f23efa0fede496b70e9b1c67fa13eade4e0b83784ede917f.exe windows x86
f23f0cbf18b0aec3bcd2c88065919207
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawTextA
TranslateMessage
GetMessageA
RegisterClassExA
LoadCursorA
EndDialog
SendMessageA
SetFocus
PostMessageA
DialogBoxParamA
DestroyWindow
BeginPaint
DispatchMessageA
EndPaint
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadStringA
LoadIconA
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
Sleep
WriteProcessMemory
CreateDirectoryA
LoadLibraryA
GetModuleHandleA
lstrcpyA
GetCurrentDirectoryA
GetLocaleInfoA
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSection
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
comctl32
ord17
wtsapi32
WTSLogoffSession
WTSEnumerateProcessesA
WTSWaitSystemEvent
WTSQuerySessionInformationA
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ