Static task
static1
Behavioral task
behavioral1
Sample
ea3bac4910e939df0f0ea046400ee909fef5c81cfac46e2052475b73a6673c8e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea3bac4910e939df0f0ea046400ee909fef5c81cfac46e2052475b73a6673c8e.exe
Resource
win10v2004-20220901-en
General
-
Target
ea3bac4910e939df0f0ea046400ee909fef5c81cfac46e2052475b73a6673c8e
-
Size
466KB
-
MD5
6652e5311f8634a155e0a1e85d641247
-
SHA1
7d8eeb7a09ae58077fbce8938f8fcffb78f257ac
-
SHA256
ea3bac4910e939df0f0ea046400ee909fef5c81cfac46e2052475b73a6673c8e
-
SHA512
cad22461a366e908452296c3dae6b52909decaf541ea35ccad4e4ed2dd9a5f88e16e5e6fb3162bce55eea713671e7449e1d3d93e50bd5132263733db5781ae14
-
SSDEEP
6144:XAcOoDE/uV4vdBX2+hGcw/Ng+BuHf3E36tvfg+MSkZtSW+:JOME/u+vdBHQjBuHfNtA+MSdX
Malware Config
Signatures
Files
-
ea3bac4910e939df0f0ea046400ee909fef5c81cfac46e2052475b73a6673c8e.exe windows x86
8599736b312e3e2a493c00e632c104f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapSize
GetStringTypeW
LCMapStringW
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
LoadLibraryW
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
SetPriorityClass
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapReAlloc
SetStdHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapCreate
GetProcessHeap
OpenProcess
HeapAlloc
lstrlenA
GetConsoleWindow
Sleep
GetTickCount
GetCurrentProcess
GetPriorityClass
GetComputerNameA
GetProcAddress
GetCurrentThreadId
CloseHandle
SetLastError
GetModuleHandleW
TlsFree
DecodePointer
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
lstrcpyW
GetModuleHandleA
GetEnvironmentStringsW
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
RaiseException
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
IsProcessorFeaturePresent
GetCPInfo
user32
IsClipboardFormatAvailable
DrawMenuBar
SendDlgItemMessageW
EnumDisplaySettingsA
SendMessageA
GetClientRect
InvalidateRect
SetRect
SetRectEmpty
UnionRect
BroadcastSystemMessageA
FindWindowA
GetWindowThreadProcessId
DefWindowProcA
GetSysColor
SetSysColors
GetWindowLongA
PostQuitMessage
GetMenu
GetMenuState
CheckMenuItem
ShowWindow
GetWindowRect
SetWindowPos
CreateWindowExA
GetWindow
DefFrameProcA
LoadIconA
LoadCursorA
RegisterClassExA
LoadBitmapA
GetDC
wsprintfA
ReleaseDC
LoadImageA
BeginPaint
SetScrollRange
EndPaint
IsIconic
EnumWindows
SetScrollPos
SetMenuItemInfoA
gdi32
DeleteObject
ChoosePixelFormat
SetPixelFormat
GetObjectA
CreateSolidBrush
SelectObject
TextOutA
Rectangle
CreateCompatibleDC
BitBlt
DeleteDC
CreatePen
MoveToEx
LineTo
CreateFontIndirectA
comdlg32
FindTextW
advapi32
CredEnumerateA
shell32
SHGetFileInfoA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
odbc32
ord36
netapi32
NetUserEnum
psapi
GetProcessMemoryInfo
comctl32
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Create
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 255KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ