Static task
static1
Behavioral task
behavioral1
Sample
eb058eb5ff08ee4031ed81cb6994135d3ff48469b6385f97d0e4711022497e22.exe
Resource
win7-20220812-en
General
-
Target
eb058eb5ff08ee4031ed81cb6994135d3ff48469b6385f97d0e4711022497e22
-
Size
672KB
-
MD5
53c0da5276a30ff4a8b47835468a7210
-
SHA1
1a23e512a196bf2657a7f7aa0ebb3327958d5cee
-
SHA256
eb058eb5ff08ee4031ed81cb6994135d3ff48469b6385f97d0e4711022497e22
-
SHA512
a2b0b9fe960a2a675cef69f85d133db07bbab847d1525e9acd0ac361d352781cc23d6a725d86e5fc9f343df4f8ffc81176b9cf695d22a8f9b36205112f83abbf
-
SSDEEP
12288:8p16q2JIfwr4t/TgAlImwn40RYYhod655H64Lcl90a7LlayhLcN1fC6Rm3W3:8aWZtLFl+n40yYh265/I2JwEm
Malware Config
Signatures
Files
-
eb058eb5ff08ee4031ed81cb6994135d3ff48469b6385f97d0e4711022497e22.exe windows x86
307900359aefbe9467eddcfb65bfa50f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
lstrcmpA
FreeLibrary
CloseHandle
OpenProcess
HeapAlloc
GetProcessHeap
HeapFree
GetProcAddress
LoadLibraryA
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemDirectoryA
TerminateProcess
Sleep
GetCurrentProcess
GetCurrentThread
MultiByteToWideChar
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
GetSystemDefaultLangID
GetExitCodeProcess
GetTempFileNameA
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
DeleteFileA
ExpandEnvironmentStringsA
GetTimeFormatA
GetDateFormatA
GetPrivateProfileStringA
OutputDebugStringA
GetDiskFreeSpaceA
LocalAlloc
LocalFree
GetSystemInfo
VirtualProtect
SetConsoleCtrlHandler
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetFileType
FlushFileBuffers
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FindClose
GetFileAttributesA
CopyFileA
GetLastError
lstrlenA
CreateDirectoryA
IsDBCSLeadByte
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FindNextFileA
InterlockedExchange
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
SetUnhandledExceptionFilter
GetCPInfo
GetOEMCP
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
user32
CharNextA
UnregisterClassA
LoadStringA
DialogBoxParamA
SetForegroundWindow
TranslateMessage
DispatchMessageA
PeekMessageA
MessageBoxA
GetDesktopWindow
LoadCursorA
RegisterClassExA
DefWindowProcA
PostQuitMessage
CreateWindowExA
ExitWindowsEx
FindWindowA
PostMessageA
EndDialog
advapi32
RegCreateKeyExA
RegSetValueExA
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
shlwapi
PathAppendA
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 592KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE