Static task
static1
Behavioral task
behavioral1
Sample
ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe
Resource
win10v2004-20220812-en
General
-
Target
ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d
-
Size
233KB
-
MD5
80e5eefcbbea05456c41c3cd02d455b0
-
SHA1
b8bfee191848802dd289c990bcb90d1de8e561ce
-
SHA256
ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d
-
SHA512
add48e5871113d09fa145109909e64f7c41b3b4c5e282b4c3eed9a97920a0506c9f48bceeb4c1a7ade1e00fc7401bc257aee408c609c9e265033bf3cc16ad360
-
SSDEEP
3072:KXEX6BU4XBvLFgGkTBpx1KDRrYljpvNNpxSPxII0pIIKm/TducQ:zlOvLFgvpDsSBpvNNjoII0pIIKaduc
Malware Config
Signatures
Files
-
ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe windows x86
0df8a4b7f5ca680781e1345f469ba663
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryW
SearchPathW
SetCurrentDirectoryW
SetErrorMode
SetEvent
SetFileAttributesW
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
UnhandledExceptionFilter
WaitForMultipleObjects
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
OutputDebugStringA
OpenEventW
MulDiv
LocalFree
LocalAlloc
LoadLibraryW
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemWindowsDirectoryW
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetNumberFormatW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateThread
CreateProcessW
CreateMutexW
CreateFileW
CreateFileMappingW
CreateEventW
CloseHandle
VirtualAlloc
GetStartupInfoA
GetStartupInfoW
GetWindowsDirectoryA
lstrcatA
TerminateProcess
CreateFileA
user32
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsIconic
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
KillTimer
LoadAcceleratorsW
LoadCursorW
LoadImageW
LoadStringA
LoadStringW
MapVirtualKeyExW
MapVirtualKeyW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenDesktopW
OpenInputDesktop
OpenWindowStationW
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendInput
SendMessageW
SetCapture
SetClassLongW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetProcessWindowStation
SetThreadDesktop
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
ShowWindow
ToUnicodeEx
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
WinHelpW
wsprintfA
wsprintfW
GetUserObjectInformationW
GetThreadDesktop
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetProcessWindowStation
GetParent
GetNextDlgTabItem
GetMessageW
GetMenu
GetLastActivePopup
GetKeyboardType
GetKeyboardLayout
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassInfoW
GetAsyncKeyState
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextW
DrawIconEx
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CloseWindowStation
CloseDesktop
ChildWindowFromPointEx
CheckRadioButton
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
AllowSetForegroundWindow
ActivateKeyboardLayout
LoadIconW
LoadIconA
GetUpdateRect
gdi32
TextOutW
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectPalette
SelectObject
RealizePalette
Polyline
GetTextMetricsW
GetObjectW
GetMapMode
GetDeviceCaps
DeleteObject
DeleteDC
DPtoLP
GetStockObject
CreateRoundRectRgn
CreatePenIndirect
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
BitBlt
CreateSolidBrush
comdlg32
ChooseFontW
advapi32
AdjustTokenPrivileges
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
FreeSid
CheckTokenMembership
RegOpenKeyExW
AddAccessAllowedAce
AllocateAndInitializeSid
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathIsFileSpecW
PathIsURLW
msvcrt
_exit
wcscpy
swscanf
setlocale
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_ftol
_initterm
_vsnwprintf
_wcsicmp
_wmakepath
_wsplitpath
_wtoi
exit
free
malloc
memmove
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ