Static task
static1
Behavioral task
behavioral1
Sample
0eb96145bff67232d69ef814d6c88bb50bbcab55d26de672c82998d89d658198.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eb96145bff67232d69ef814d6c88bb50bbcab55d26de672c82998d89d658198.exe
Resource
win10v2004-20220812-en
General
-
Target
0eb96145bff67232d69ef814d6c88bb50bbcab55d26de672c82998d89d658198
-
Size
172KB
-
MD5
609fc8319e50c51b599bd17aab2ecaa1
-
SHA1
0bc79c12e6d539fc1832f364869c97c0ca4f943c
-
SHA256
0eb96145bff67232d69ef814d6c88bb50bbcab55d26de672c82998d89d658198
-
SHA512
e31eac3087e38d90ee343c95f6e85065bdb06b589b27c38c9c9b1449f84c6fc685a9bdb427abd186307dc21f8c14a64ec782ef48e7b0b250f6dbd95b615396e5
-
SSDEEP
3072:wBXfBB4dyDtyaDND7KEx2rIJ9EVMyfkVP5PubhdlufkSc1UPiKwPrvMvNk3+Sc0W:w5ZB4dItJDND7KEx2rIJ9CMmkVRWbhaz
Malware Config
Signatures
Files
-
0eb96145bff67232d69ef814d6c88bb50bbcab55d26de672c82998d89d658198.exe windows x86
908a42ad6d3b479cff6454008494f340
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextW
kernel32
InterlockedDecrement
lstrcmpiW
lstrcpynW
lstrcatW
GetModuleFileNameW
HeapDestroy
FreeLibrary
GetProcAddress
LoadLibraryW
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
GetShortPathNameW
GetComputerNameW
InterlockedIncrement
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
lstrlenW
lstrcpyW
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
VirtualAlloc
ole32
CoCreateInstance
CoSetProxyBlanket
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstanceEx
advapi32
RegEnumValueW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegSetValueExW
rpcrt4
NdrDllUnregisterProxy
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrOleAllocate
NdrProxyErrorHandler
NdrClearOutParameters
NdrProxyFreeBuffer
RpcRaiseException
NdrConvert
NdrProxySendReceive
NdrPointerMarshall
NdrProxyGetBuffer
NdrPointerBufferSize
NdrProxyInitialize
NdrStubGetBuffer
NdrPointerUnmarshall
NdrStubInitialize
NdrDllGetClassObject
NdrDllRegisterProxy
msvcrt
malloc
free
__CxxFrameHandler
wcschr
realloc
wcslen
_wcsicmp
_initterm
wcscmp
Sections
���̂�0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ