Static task
static1
Behavioral task
behavioral1
Sample
eb7333d9d7a07b1b71b7801f41e265b3f3e613122db4d44b9488b3f3e997d583.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb7333d9d7a07b1b71b7801f41e265b3f3e613122db4d44b9488b3f3e997d583.exe
Resource
win10v2004-20220901-en
General
-
Target
eb7333d9d7a07b1b71b7801f41e265b3f3e613122db4d44b9488b3f3e997d583
-
Size
87KB
-
MD5
a0219c3f414e48205c5b206024e3922d
-
SHA1
89b700d83b30ee11a683bc678b469abf552924e0
-
SHA256
eb7333d9d7a07b1b71b7801f41e265b3f3e613122db4d44b9488b3f3e997d583
-
SHA512
316fab8471c9929a9635a299b393a1d03de33ada074b47414aff14b44cb10b3d3fabec17268c611424f68552767194dbe3efca2347b6cad499d3e539b3aa57e9
-
SSDEEP
1536:el0MZQVorj41TnHx0DRVHWI4wRMYzkxw:e0MkBHGDPRMYOw
Malware Config
Signatures
Files
-
eb7333d9d7a07b1b71b7801f41e265b3f3e613122db4d44b9488b3f3e997d583.exe windows x86
536bef3984da4f9750d397c1dc621464
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
WriteConsoleA
GetModuleFileNameA
GetProcessHeap
DeleteFileA
LoadLibraryA
CreateFileA
SetLocalTime
GetFileAttributesW
ReadConsoleA
GetEnvironmentStringsA
SetEvent
CloseHandle
VirtualProtect
SetLastError
GetStartupInfoA
OpenSemaphoreA
lstrlenA
CreateSemaphoreW
CreateDirectoryW
GetFileSize
GlobalFree
HeapSize
SetLastError
GetTickCount
user32
DispatchMessageA
DestroyMenu
IsWindow
FindWindowA
CallWindowProcW
SetFocus
DrawTextW
IsZoomed
PeekMessageA
GetClassInfoA
DispatchMessageA
GetWindowLongA
GetSysColor
wups
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
DllGetClassObject
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE