Static task
static1
Behavioral task
behavioral1
Sample
ea42dd48bd060843857e6532ccb8e3296e261be802c9f6010923605b9a3aba80.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea42dd48bd060843857e6532ccb8e3296e261be802c9f6010923605b9a3aba80.exe
Resource
win10v2004-20220901-en
General
-
Target
ea42dd48bd060843857e6532ccb8e3296e261be802c9f6010923605b9a3aba80
-
Size
1.2MB
-
MD5
de36f69f2296258ecb479dd78789a819
-
SHA1
f8001cc5934e574f98f1773cb24840a442cc8ec5
-
SHA256
ea42dd48bd060843857e6532ccb8e3296e261be802c9f6010923605b9a3aba80
-
SHA512
08302f4feae6732ee72902b0b621590c35b8f933cb672e1e4c187aa6ac3cf97ff5615ef98601d5191dc7912cb7851d46ac5747c9df660908977ffbced80cc5eb
-
SSDEEP
24576:JBvo6r8Gv8SvMOPIjLeyAg5x1hJbmiBjHjFLejJkzgQZOCf:JBvxr848FfgKBwk8to
Malware Config
Signatures
Files
-
ea42dd48bd060843857e6532ccb8e3296e261be802c9f6010923605b9a3aba80.exe windows x86
b86b1175bc4f2a2d06d8b4437f167706
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
CreateFileW
MapViewOfFile
UnmapViewOfFile
FileTimeToLocalFileTime
OpenEventA
WideCharToMultiByte
FindResourceA
SizeofResource
LockResource
LoadResource
CreateThread
GetCommandLineA
FreeResource
WaitForSingleObject
Sleep
SuspendThread
TerminateThread
CloseHandle
ResumeThread
GetModuleFileNameA
GetVersion
CreateEventA
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
ResetEvent
SetEvent
GetProcAddress
GetModuleHandleA
GetLocalTime
SetErrorMode
SetLastError
GetLastError
LoadLibraryA
GetVersionExA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
FreeLibrary
lstrcmpW
MultiByteToWideChar
CompareStringA
lstrlenA
LocalFree
GetProcessHeap
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
GetLocaleInfoW
CreateProcessA
GetExitCodeProcess
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
HeapReAlloc
HeapSize
HeapAlloc
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetConsoleMode
GetConsoleCP
LoadLibraryW
IsValidCodePage
GetACP
OutputDebugStringW
GetFileType
WriteConsoleW
OutputDebugStringA
GetStdHandle
DebugBreak
VirtualQuery
GetSystemInfo
VirtualAlloc
IsBadReadPtr
HeapValidate
GetStartupInfoA
ExitProcess
ExitThread
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RaiseException
RtlUnwind
GetTickCount
WritePrivateProfileStringA
GetFileSizeEx
GetModuleHandleW
FileTimeToSystemTime
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
GetOEMCP
GetCPInfo
VirtualProtect
GlobalFlags
GetAtomNameA
InterlockedDecrement
GetModuleFileNameW
GetFileTime
GetFileAttributesA
InterlockedExchange
lstrcmpA
GetCurrentThread
GetLocaleInfoA
ConvertDefaultLocale
EnumResourceLanguagesA
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetCurrentProcessId
user32
CharUpperA
SetRectEmpty
SetCursorPos
UnpackDDElParam
ReuseDDElParam
DestroyMenu
GetWindowThreadProcessId
TranslateAcceleratorA
LoadAcceleratorsA
EndDialog
CreateDialogIndirectParamA
PostQuitMessage
ShowWindow
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
RegisterWindowMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
SendDlgItemMessageA
PeekMessageA
DispatchMessageA
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
WinHelpA
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
GetDlgCtrlID
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
SetMenu
GetMenu
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
LoadIconA
PostThreadMessageA
SetScrollRange
SetScrollPos
GetScrollPos
MapDialogRect
EnableWindow
SetWindowContextHelpId
GetForegroundWindow
SetForegroundWindow
TranslateMessage
IsChild
GetLastActivePopup
GetWindow
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
GetFocus
SetCapture
SetActiveWindow
GetActiveWindow
KillTimer
SetTimer
RedrawWindow
ShowOwnedPopups
IsWindowVisible
ValidateRect
InvalidateRgn
InvalidateRect
UpdateWindow
MapWindowPoints
GetClientRect
GetWindowRect
BringWindowToTop
IsZoomed
IsIconic
GetSystemMenu
PostMessageA
GetKeyState
SetWindowPos
GetParent
IsWindowEnabled
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
LoadMenuA
SetMenuItemBitmaps
ModifyMenuA
InsertMenuItemA
GetSubMenu
GetMenuItemInfoA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetMessageA
GetClipboardFormatNameA
CopyAcceleratorTableA
CharNextA
EnableMenuItem
CheckMenuItem
IsRectEmpty
UnregisterClassA
RegisterClipboardFormatA
AppendMenuA
InflateRect
DeleteMenu
IsMenu
CreatePopupMenu
GrayStringA
DrawTextExA
TabbedTextOutA
DrawFocusRect
DrawStateA
FrameRect
LoadBitmapA
GetSysColorBrush
GetWindowLongA
SetWindowLongA
MessageBoxA
SetRect
MessageBeep
SetWindowTextA
LoadCursorA
CopyRect
DrawTextA
GetCursorPos
PtInRect
WindowFromPoint
GetCapture
ReleaseCapture
GetDesktopWindow
DrawIconEx
wsprintfA
IsWindow
SendMessageA
LoadImageA
GetDC
ReleaseDC
GetSysColor
FillRect
SetCursor
DestroyIcon
DestroyCursor
gdi32
GetDeviceCaps
GetObjectA
GetPixel
SetPixel
CreateCompatibleBitmap
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
DeleteObject
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
PatBlt
TextOutA
ExtTextOutA
GetTextExtentPoint32A
GetTextMetricsA
Escape
CreateFontIndirectA
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
ExtSelectClipRgn
CreateSolidBrush
SetBkMode
GetObjectType
CreatePen
CreatePatternBrush
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
SetThreadToken
RevertToSelf
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenThreadToken
shell32
DragFinish
DragQueryFileA
ShellExecuteExA
comctl32
_TrackMouseEvent
shlwapi
PathFindExtensionA
PathIsUNCA
PathStripToRootA
PathRemoveFileSpecW
PathFindFileNameA
oledlg
ord8
ole32
OleFlushClipboard
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
StringFromGUID2
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitializeEx
CoTaskMemAlloc
StringFromCLSID
OleIsCurrentClipboard
CoRegisterMessageFilter
CoTaskMemFree
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
SysFreeString
SysAllocString
VariantCopy
VariantTimeToSystemTime
SafeArrayDestroy
OleCreateFontIndirect
SystemTimeToVariantTime
ws2_32
WSACleanup
WSAGetLastError
WSAStartup
gethostbyname
inet_addr
htons
socket
connect
WSAAsyncSelect
closesocket
Sections
.text Size: 798KB - Virtual size: 798KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ