Static task
static1
Behavioral task
behavioral1
Sample
ebe092886b8545e638b474eaac2470594d13709aaeae6ddd10a9eb9233cea3e1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebe092886b8545e638b474eaac2470594d13709aaeae6ddd10a9eb9233cea3e1.dll
Resource
win10v2004-20220812-en
General
-
Target
ebe092886b8545e638b474eaac2470594d13709aaeae6ddd10a9eb9233cea3e1
-
Size
16KB
-
MD5
777c1b7c6b8485c9d0c9caf2ff2dd800
-
SHA1
a68d426d1f7fdb9588aff1b3c5062df127f3170e
-
SHA256
ebe092886b8545e638b474eaac2470594d13709aaeae6ddd10a9eb9233cea3e1
-
SHA512
7f07d635d95508757617e384a5e728bb529ea64d06e62ff6759c9c09d02f501191858ef390d8060c801b41eb1d17f55b2f93cccf5bb714ce2a9bacdb59ba0691
-
SSDEEP
192:urRxfLi7N3EQdEM3rBCvVG5fW5owxicve+3irREjER20h:u+7GGNoyfW5oYise+T4R20h
Malware Config
Signatures
Files
-
ebe092886b8545e638b474eaac2470594d13709aaeae6ddd10a9eb9233cea3e1.dll windows x86
000ce953bceb2927d9278b70d83ad4a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
Module32Next
Module32First
ReleaseMutex
GetModuleFileNameA
CreateMutexA
WinExec
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
WriteFile
GetTempPathA
GetTickCount
GetPrivateProfileIntA
Sleep
CreateThread
CloseHandle
GetPrivateProfileStringA
GetLastError
ReadFile
GetCurrentProcessId
user32
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
wsprintfA
GetForegroundWindow
GetWindowTextA
GetClassNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shlwapi
StrStrIA
msvcrt
??3@YAXPAX@Z
strcpy
strstr
atoi
strcat
strlen
strncat
memset
strncpy
memcpy
_purecall
strcmp
??2@YAPAXI@Z
wininet
InternetCloseHandle
Sections
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ