Static task
static1
Behavioral task
behavioral1
Sample
1eeb3f620d45da30cd457cf6bd4e6faf45cc371f84c52d8e0f757e3322286ca9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1eeb3f620d45da30cd457cf6bd4e6faf45cc371f84c52d8e0f757e3322286ca9.exe
Resource
win10v2004-20220812-en
General
-
Target
1eeb3f620d45da30cd457cf6bd4e6faf45cc371f84c52d8e0f757e3322286ca9
-
Size
96KB
-
MD5
0869d4abe5fee885a952c8282460b720
-
SHA1
4ec947c914c9ab5123d56efeabd6e1d9e84e978b
-
SHA256
1eeb3f620d45da30cd457cf6bd4e6faf45cc371f84c52d8e0f757e3322286ca9
-
SHA512
a39a80cef9b5e48a592208916714503de8faf958bae843690c74c2f3871255437a1a15b96bc588300f73777bb5636f7184951b419afb0fbc9eaa0d24d95eae45
-
SSDEEP
1536:Jm3tKSJ2ZKGpXVyPI3ooPl5y0PQpSMyD1MnqU9m1I:Jm3IhHSKfPl5y0PQcjDUa
Malware Config
Signatures
Files
-
1eeb3f620d45da30cd457cf6bd4e6faf45cc371f84c52d8e0f757e3322286ca9.exe windows x86
12305f2cea23ef0cccdc6294f7b23a84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExW
RegQueryValueA
RegCreateKeyExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
RegOpenKeyExW
kernel32
DeleteFileA
GetVersionExA
FormatMessageA
GetLastError
GetSystemDirectoryA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
CloseHandle
FlushFileBuffers
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
SetStdHandle
CreateFileA
CompareStringA
MultiByteToWideChar
CompareStringW
SetEnvironmentVariableA
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetLastError
FlushInstructionCache
user32
MessageBoxA
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edgfcpd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE