Static task
static1
Behavioral task
behavioral1
Sample
ec65def4cf6a4039b2df934a81f4e2b6a0baa844a3756aef7d20dba696db38df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec65def4cf6a4039b2df934a81f4e2b6a0baa844a3756aef7d20dba696db38df.exe
Resource
win10v2004-20220812-en
General
-
Target
ec65def4cf6a4039b2df934a81f4e2b6a0baa844a3756aef7d20dba696db38df
-
Size
109KB
-
MD5
0070bea0d6c8832a5aa4ae5bf5e95690
-
SHA1
a20a539e5b8253b8560dc26b4d4e8001607775b5
-
SHA256
ec65def4cf6a4039b2df934a81f4e2b6a0baa844a3756aef7d20dba696db38df
-
SHA512
01687f43b549f234d56c7a73a6e3c5ae122eab15d2e7014f1a63bbbc877841a65c2ab11d7bd10e24cc82fc67e425a6f8f1d9e97f58132868d27e59422a8144d2
-
SSDEEP
3072:DpnDzUUK1Prb2K5RYdF9zXGiY1AYa0ISxRT:VfYrb2KronzXlY6D0fx9
Malware Config
Signatures
Files
-
ec65def4cf6a4039b2df934a81f4e2b6a0baa844a3756aef7d20dba696db38df.exe windows x86
2c0d37183080104989dbbdbb54506093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
GetVersionExA
HeapSize
LoadLibraryW
OpenEventW
FreeLibrary
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
HeapCreate
HeapDestroy
DeviceIoControl
LocalAlloc
GetEnvironmentVariableW
IsWow64Process
EncodePointer
DecodePointer
GetLastError
GetCommandLineW
MapViewOfFile
LocalFree
msvcrt
wcsrchr
??2@YAPAXI@Z
memset
??3@YAXPAX@Z
_vsnwprintf
_vsnprintf
__getmainargs
??1type_info@@UAE@XZ
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__CxxFrameHandler3
_wcsicmp
wcschr
malloc
towlower
free
_wcsnicmp
_wfopen
fgetws
feof
fclose
wcstok
_wtoi
swscanf_s
iswctype
memcpy
_purecall
shell32
SHGetFolderPathW
ord165
CommandLineToArgvW
advapi32
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
ole32
CoInitializeEx
CoUninitialize
user32
UnregisterClassA
GetSystemMetrics
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
euxnyrt Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE