Static task
static1
Behavioral task
behavioral1
Sample
eef417379ae6be296e0587fe88736d5b88fd1534a347607d7a5eebad216c4db7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eef417379ae6be296e0587fe88736d5b88fd1534a347607d7a5eebad216c4db7.exe
Resource
win10v2004-20220812-en
General
-
Target
eef417379ae6be296e0587fe88736d5b88fd1534a347607d7a5eebad216c4db7
-
Size
81KB
-
MD5
ff0e5d8075d5d1415feb7008578114d2
-
SHA1
85b13450b5e7584d5ab4067dc53bda4e09c5fabd
-
SHA256
eef417379ae6be296e0587fe88736d5b88fd1534a347607d7a5eebad216c4db7
-
SHA512
96f630b23765f9e7edb6968bb7222f09badd4840472eb228dfabc8020b3622ec7a87d7d2cb5e107d328ac7407e0698d7939b6f84889d6cb0b7e65edf0d192644
-
SSDEEP
1536:j0k6x6dJpktc+syc/VUAL3EyUOaK6cgX5C01zA54:jFM5z8lLv9o5C0S54
Malware Config
Signatures
Files
-
eef417379ae6be296e0587fe88736d5b88fd1534a347607d7a5eebad216c4db7.exe windows x86
3028465870c5f98fa086facbb6a57a64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
VirtualFreeEx
CloseHandle
GetLastError
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
GetModuleHandleA
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GlobalLock
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
RtlUnwind
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
GlobalAlloc
SizeofResource
LockResource
LoadResource
LoadLibraryA
FindResourceA
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
RaiseException
GetCurrentThreadId
SetLastError
TlsFree
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
user32
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetWindowLongA
SetWindowLongA
SetTimer
ShowWindow
UpdateWindow
ReleaseDC
UpdateLayeredWindow
GetDC
SetWindowPos
IsWindow
GetSystemMetrics
SendMessageA
GetWindowThreadProcessId
FindWindowExA
GetKeyState
GetWindowRect
GetCursorPos
KillTimer
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
gdi32
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
ole32
CreateStreamOnHGlobal
gdiplus
GdiplusShutdown
GdipDrawImageRectRect
GdipFree
GdipAlloc
GdipCloneImage
GdipDisposeImage
GdipLoadImageFromStream
GdiplusStartup
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectI
GdipGetImageHeight
GdipGetImageWidth
shlwapi
StrStrA
PathUnquoteSpacesA
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ