Static task
static1
Behavioral task
behavioral1
Sample
ebd5988151ea9d76a34a55f0976c030d1512fcbe08708584416a433b8a5a25f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebd5988151ea9d76a34a55f0976c030d1512fcbe08708584416a433b8a5a25f6.exe
Resource
win10v2004-20220812-en
General
-
Target
ebd5988151ea9d76a34a55f0976c030d1512fcbe08708584416a433b8a5a25f6
-
Size
164KB
-
MD5
6569b11fc2953822e7189165990d9980
-
SHA1
024e205685de62247572e1d83b95bd6edaa650cb
-
SHA256
ebd5988151ea9d76a34a55f0976c030d1512fcbe08708584416a433b8a5a25f6
-
SHA512
2bd530a863402f3e9a11c690ea281494b230aaf032a45e6c311820dfe03b3c26c6e06cd9bd21ad4e693d1946ad70f63067be106a02c7d28dbba5937202dd41a1
-
SSDEEP
3072:RuFuzMoZMWgb+ugEEPCFhPG6ZoIvaL5AJjSc8tLQ7XGEd:cVowBHFBHyae5AJjSvLG
Malware Config
Signatures
Files
-
ebd5988151ea9d76a34a55f0976c030d1512fcbe08708584416a433b8a5a25f6.exe windows x86
8dc65e7e5f211b96333c5fbce767f774
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
msvcrt
__CxxFrameHandler
_strrev
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
_initterm
memset
??2@YAPAXI@Z
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_strcmpi
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
clock
realloc
strchr
strncat
exit
_errno
sprintf
strncmp
printf
time
srand
atoi
rand
strncpy
strcat
strcpy
strcmp
strrchr
_except_handler3
malloc
free
memcmp
kernel32
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetProcAddress
LoadLibraryA
CloseHandle
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
DeleteFileA
Sleep
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetLogicalDriveStringsA
FindClose
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
SetLastError
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FreeLibrary
VirtualFree
CreateThread
GetTickCount
WaitForSingleObject
TerminateThread
WinExec
OutputDebugStringA
GetModuleFileNameA
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
SetFileAttributesA
CopyFileA
CreateMutexA
MoveFileExA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetModuleHandleA
GetStartupInfoA
DeleteCriticalSection
InitializeCriticalSection
OpenProcess
GetLastError
user32
IsWindow
CloseWindow
CharNextA
wsprintfA
LoadCursorA
DestroyCursor
BlockInput
SendMessageA
SystemParametersInfoA
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
GetClipboardData
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
GetSystemMetrics
gdi32
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
BitBlt
advapi32
GetTokenInformation
LookupAccountSidA
CreateServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ws2_32
__WSAFDIsSet
recvfrom
bind
WSAGetLastError
inet_ntoa
htonl
sendto
gethostname
getsockname
inet_addr
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSAStartup
WSACleanup
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
mfc42
ord924
ord860
ord6663
ord858
ord535
ord540
ord800
ord6877
ord939
ord537
ord2818
ord6648
ord2764
ord4129
ord926
ord922
ord4278
wininet
InternetOpenUrlA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSendMessage
ICCompressorFree
ICClose
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSeqCompressFrameEnd
ICOpen
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ