Static task
static1
Behavioral task
behavioral1
Sample
ebeb642d7b50594b0e395f868a4f7d326d08396d904bd4a72a4c164f91f8f641.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebeb642d7b50594b0e395f868a4f7d326d08396d904bd4a72a4c164f91f8f641.exe
Resource
win10v2004-20220812-en
General
-
Target
ebeb642d7b50594b0e395f868a4f7d326d08396d904bd4a72a4c164f91f8f641
-
Size
180KB
-
MD5
6197d8ff51d12311276a101eecae59f0
-
SHA1
1715690de78f27e2c43482906cc91ffc474c29a9
-
SHA256
ebeb642d7b50594b0e395f868a4f7d326d08396d904bd4a72a4c164f91f8f641
-
SHA512
e2c5c525e4e77c6a631cee773dcca14bf3a08efe1e80121d91793b28441dd731e5393b0916bc1fa18820904135d13b900b44c54f84335df19bf26e5e1184952b
-
SSDEEP
3072:A5xiUAUl0mBq3QKFlMhtANI3GCZi+u93XVBR2Nr9hoOVGToadTu:A5R7li7cAPvH/Rmo/ToUa
Malware Config
Signatures
Files
-
ebeb642d7b50594b0e395f868a4f7d326d08396d904bd4a72a4c164f91f8f641.exe windows x86
5cf751f73664779abb680637e02a1251
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
lstrcpyA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
lstrcatA
FreeLibrary
LoadLibraryA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
RtlUnwind
CreateThread
ExitThread
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
TerminateProcess
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CloseHandle
GetVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
Sleep
lstrcpynA
CreateMutexA
GetLastError
GetModuleFileNameA
user32
GetPropA
SetPropA
GetClassLongA
GetDlgCtrlID
GetWindowTextA
GetDlgItem
GetMenuItemID
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SetWindowTextA
GetSysColorBrush
ReleaseDC
GetDC
CallWindowProcA
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
RemovePropA
PostMessageA
FindWindowA
GetMessageTime
GetClassNameA
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
DestroyWindow
LoadMenuA
GetSubMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenu
DestroyMenu
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetMessagePos
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
comctl32
ord17
vlanapi
RT_CreateVWLAN
RT_DeldteVWLAN
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�� Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE