Static task
static1
Behavioral task
behavioral1
Sample
eaced8b081c16096349aec12351f72daaf7f93664752f320e74021782254f13a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaced8b081c16096349aec12351f72daaf7f93664752f320e74021782254f13a.exe
Resource
win10v2004-20220812-en
General
-
Target
eaced8b081c16096349aec12351f72daaf7f93664752f320e74021782254f13a
-
Size
123KB
-
MD5
690f6f0de58799b0e1706dd019e7bdd0
-
SHA1
a42f35fc0f9dc236526cd9d2ca2fda2b45785af1
-
SHA256
eaced8b081c16096349aec12351f72daaf7f93664752f320e74021782254f13a
-
SHA512
c57e443f675a4b38000584dc46d0944187d0d9edb241e08524d4d9e2dcdd81402a0d7f31c5ca15e287d40943de5d9a2a881d1d5133946f429cf7956c42f5535a
-
SSDEEP
1536:k2YsF/eoUB4ZsYaIl+V/0rPLZQxvcnMezeB1uTf8ndzoxwxYeF9NdGSucoc3iP:kmUqaIvcctzVQoxwmU9ucoc
Malware Config
Signatures
Files
-
eaced8b081c16096349aec12351f72daaf7f93664752f320e74021782254f13a.exe windows x86
93f17111457392018f8dea6c4fedae7a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetDriveTypeA
ResumeThread
GetFileAttributesA
HeapSize
VirtualProtect
GetLocaleInfoA
GetModuleHandleA
GlobalSize
CreatePipe
DeleteFileA
CreateDirectoryA
GetCommandLineA
SuspendThread
SetLocalTime
GetPriorityClass
WriteFile
GetProcessHeap
ResumeThread
GetStdHandle
IsBadReadPtr
ReadConsoleW
user32
SetRect
wsprintfA
GetWindowLongA
GetMessageA
LoadCursorA
DestroyMenu
SetCursor
DispatchMessageA
GetWindowTextW
GetWindowLongA
SetFocus
PeekMessageA
DrawIcon
els
DllGetClassObject
DllRegisterServer
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE