Static task
static1
Behavioral task
behavioral1
Sample
ec77ab485e1a6ced009ce423cf0b1c19bd4a6c6a5542c8c0f99f500e0b15d969.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec77ab485e1a6ced009ce423cf0b1c19bd4a6c6a5542c8c0f99f500e0b15d969.exe
Resource
win10v2004-20220812-en
General
-
Target
ec77ab485e1a6ced009ce423cf0b1c19bd4a6c6a5542c8c0f99f500e0b15d969
-
Size
397KB
-
MD5
3e16080390dc7e194a3c58aeac3879c0
-
SHA1
d7a8b839cc48125c30da675dde06d99da96d6ef3
-
SHA256
ec77ab485e1a6ced009ce423cf0b1c19bd4a6c6a5542c8c0f99f500e0b15d969
-
SHA512
8fb35a31f1e0552a7aa188b966376d80bd97debaba3af8f181ef670291b8a86a45f8028cf995019a9ac6d65fbce630357f1bd3d3b3d686b19fce5014eb821aac
-
SSDEEP
6144:HIUq7NUX91NAC9Sxzx6qc/mUbIYiWNbGlD9+EXWsvrABmcruuR6Y0U0v1xw7ynq:7q7YgC9SxgqcJ0v8bOA0nimUuHvvnwcq
Malware Config
Signatures
Files
-
ec77ab485e1a6ced009ce423cf0b1c19bd4a6c6a5542c8c0f99f500e0b15d969.exe windows x86
28548278f4befd17c3d615b8db13a79a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
RemoveDirectoryW
CreateDirectoryW
GetLastError
GetProcAddress
DeleteFileW
GetSystemInfo
Process32NextW
GetVersionExW
GetModuleHandleW
CreateToolhelp32Snapshot
GetModuleFileNameW
Process32FirstW
CloseHandle
GetCommandLineW
GetCurrentProcessId
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateFileW
OpenFileMappingW
LocalFree
CreateThread
MultiByteToWideChar
SetLastError
CreateProcessW
CreateEventW
WaitForMultipleObjects
GetCurrentThreadId
FormatMessageW
InterlockedIncrement
InterlockedCompareExchange
SetFileAttributesW
CopyFileW
MoveFileExW
FindNextFileW
FindFirstFileW
FindClose
WideCharToMultiByte
WaitForSingleObject
ReleaseMutex
CreateMutexW
OpenMutexW
GetFileSize
SetFilePointer
WriteFile
ReadFile
FlushFileBuffers
LCMapStringW
Sleep
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
GetSystemTimeAsFileTime
RtlUnwind
HeapReAlloc
GetTimeZoneInformation
RaiseException
GetStringTypeA
GetStringTypeW
GetCPInfo
LCMapStringA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetFullPathNameW
GetCurrentDirectoryA
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
CreateFileA
CompareStringA
CompareStringW
GetTickCount
user32
GetWindowLongW
DestroyWindow
OpenClipboard
SetClipboardData
EmptyClipboard
MessageBoxW
DialogBoxParamW
GetDlgItem
SetWindowTextW
GetWindowTextLengthW
EndDialog
GetWindowTextW
SendMessageW
CloseClipboard
LoadIconW
FindWindowW
ShowWindow
SetWindowLongW
CreateDialogParamW
SetTimer
SetForegroundWindow
IsIconic
imm32
ImmDisableIME
comctl32
InitCommonControlsEx
advapi32
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetNamedSecurityInfoW
GetSecurityInfo
SetNamedSecurityInfoW
BuildExplicitAccessWithNameW
GetSecurityDescriptorSacl
SetEntriesInAclW
SetSecurityInfo
shell32
SHFileOperationW
SHGetSpecialFolderPathW
Sections
.text Size: 236KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE