Static task
static1
Behavioral task
behavioral1
Sample
ea1c80a88a0c13b73139ebad9e0714e707b9d44fa1dac802ee72e9e1434458c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea1c80a88a0c13b73139ebad9e0714e707b9d44fa1dac802ee72e9e1434458c6.exe
Resource
win10v2004-20220812-en
General
-
Target
ea1c80a88a0c13b73139ebad9e0714e707b9d44fa1dac802ee72e9e1434458c6
-
Size
236KB
-
MD5
a093ac8b1b286dbd834680abd4533170
-
SHA1
10d9197da995d7f21d7789359426f8168a738643
-
SHA256
ea1c80a88a0c13b73139ebad9e0714e707b9d44fa1dac802ee72e9e1434458c6
-
SHA512
0a3179a17a557ae0b6643276e7b65c94141fad201eacde7f2dfc7a0e277d1d2e039f316f15683f311f414cc3e4927b1cfac809ffcc6875c9a1dc1e7aa89c5786
-
SSDEEP
6144:InhNpPO3+xe0H66MoEwHBpUoM/3RIRa2OZviBhNPUpbtNkGZ7GH:wjNQ4VUoGv2OZv1bzki7k
Malware Config
Signatures
Files
-
ea1c80a88a0c13b73139ebad9e0714e707b9d44fa1dac802ee72e9e1434458c6.exe windows x86
a317c0c82a6f0b8ed7943d6a86c5985a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegFlushKey
RegQueryValueExA
RegSetValueExA
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
user32
RegisterClassExA
MessageBoxA
SetForegroundWindow
SetWindowsHookExA
GetSystemMetrics
PostMessageA
SetDlgItemTextA
LoadIconA
GetClientRect
EnableWindow
EnumWindowStationsA
IsIconic
ShowWindow
SetWindowPos
SendMessageA
UnhookWindowsHookEx
SetWindowTextA
EndDialog
GetWindowRect
DefWindowProcA
PostQuitMessage
LoadImageA
SetClassLongA
UnregisterClassA
GetDlgItemTextA
FindWindowA
DialogBoxParamA
GetDlgItem
kernel32
SetCurrentDirectoryA
DeleteFileA
GetFileType
CreateProcessA
GetLocaleInfoA
VirtualAlloc
LoadResource
FindResourceA
InterlockedIncrement
FlushFileBuffers
HeapAlloc
GetACP
TerminateThread
GetLastError
MultiByteToWideChar
TlsAlloc
GetLocaleInfoW
HeapCreate
GetFileAttributesA
SetLastError
FreeEnvironmentStringsA
TerminateProcess
GlobalHandle
FreeLibrary
GetProcAddress
GetFileSize
SetStdHandle
FindFirstFileA
GetCurrentThread
GlobalLock
GetOEMCP
IsValidLocale
CreateThread
FileTimeToSystemTime
IsBadWritePtr
TlsGetValue
GetStdHandle
FindClose
HeapDestroy
lstrcatA
UnhandledExceptionFilter
SetEnvironmentVariableA
lstrlenA
InitializeCriticalSection
CloseHandle
lstrcpyA
ExitProcess
IsValidCodePage
LCMapStringA
LoadLibraryA
LeaveCriticalSection
GlobalUnlock
GetStringTypeA
GetSystemDefaultLangID
GetCurrentDirectoryA
WideCharToMultiByte
LCMapStringW
GetComputerNameA
FatalAppExitA
VirtualFree
GetVersionExA
TlsFree
ReadFile
FreeEnvironmentStringsW
SetFilePointer
GetModuleFileNameA
GetTempFileNameA
CompareStringA
GetACP
GlobalFree
GetStringTypeW
SizeofResource
GetUserDefaultLCID
WinExec
EnterCriticalSection
WriteFile
GetDriveTypeA
HeapFree
GlobalAlloc
FileTimeToLocalFileTime
TlsSetValue
GetEnvironmentStrings
EnumSystemLocalesA
CompareStringW
GetEnvironmentStringsW
GetFullPathNameA
GetCPInfo
RtlUnwind
LockResource
SetEndOfFile
SetHandleCount
GetStartupInfoA
GetTempPathA
CreateFileA
GetCurrentThreadId
InterlockedDecrement
GetTimeZoneInformation
Sleep
DeleteCriticalSection
GetVersion
GetEnvironmentVariableA
SetConsoleCtrlHandler
HeapReAlloc
GetCurrentProcess
ResumeThread
wininet
HttpOpenRequestA
InternetConnectA
InternetReadFile
HttpSendRequestA
InternetCloseHandle
InternetOpenA
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ