Static task
static1
Behavioral task
behavioral1
Sample
eb215623ee2cb2051d4296b0cdf2fcb6f7725649dfed9ea4db9a2cc4d760d727.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb215623ee2cb2051d4296b0cdf2fcb6f7725649dfed9ea4db9a2cc4d760d727.exe
Resource
win10v2004-20220812-en
General
-
Target
eb215623ee2cb2051d4296b0cdf2fcb6f7725649dfed9ea4db9a2cc4d760d727
-
Size
128KB
-
MD5
81baaffe0738355e79cd96f1c837be4e
-
SHA1
15496d5bcd7cb24eadabae5cda73c0cc563cf2a5
-
SHA256
eb215623ee2cb2051d4296b0cdf2fcb6f7725649dfed9ea4db9a2cc4d760d727
-
SHA512
0859b7215bbc8b6d4444add8d848774938d73d40f7433ff71869aa17b97e3143b60aa5dc6a2a06d2de265ffc28654e5a6d528914e66f5e0b36ff4b6ca6d4bb94
-
SSDEEP
1536:PC1+oJZFA9AfnbsMFqT+ZswU7mJyICCQwDy9zYCxZOZi3N9D:q1+cZikKT+ywUSJyIbQp9Jx73N
Malware Config
Signatures
Files
-
eb215623ee2cb2051d4296b0cdf2fcb6f7725649dfed9ea4db9a2cc4d760d727.exe windows x86
1012fd5f896cd2cfe378850978123ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
IsTextUnicode
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
DeregisterEventSource
ReportEventW
LookupAccountNameW
GetUserNameW
RegisterEventSourceW
RegCreateKeyA
ImpersonateLoggedOnUser
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
kernel32
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetLastError
ExitProcess
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
GetCommandLineA
lstrlenW
GetCommandLineW
WideCharToMultiByte
GetModuleFileNameA
GetCPInfo
GetACP
FindClose
FindFirstFileA
DeleteFileA
FindFirstFileW
GetFileAttributesW
CloseHandle
SetEvent
CreateThread
CreateEventA
GetVersionExA
ReadFile
GetStdHandle
FreeLibrary
GetCurrentThreadId
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
GetModuleFileNameW
GetTickCount
GetFileType
GetUserDefaultLCID
FormatMessageA
LocalFree
LocalAlloc
FormatMessageW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
UnmapViewOfFile
CreateFileW
MapViewOfFile
CreateFileMappingA
GetFileSize
lstrlenA
GetLocaleInfoA
lstrcpyA
GetPrivateProfileStringA
GetPrivateProfileStringW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetFullPathNameA
GetFullPathNameW
InitializeCriticalSection
GetFileAttributesA
user32
PostMessageA
TranslateMessage
SendMessageA
IsWindowVisible
EnumThreadWindows
KillTimer
MsgWaitForMultipleObjects
PeekMessageA
CharNextA
DispatchMessageA
GetMessageA
LoadStringW
wsprintfA
LoadStringA
wsprintfW
CreateWindowExA
GetClassInfoA
RegisterClassA
PostQuitMessage
GetWindowLongA
SetWindowLongA
GetParent
SetTimer
DefWindowProcA
GetActiveWindow
PostThreadMessageA
MessageBoxW
ole32
CreateBindCtx
CoGetMalloc
CoGetClassObject
CreateFileMoniker
CLSIDFromProgID
CLSIDFromString
CoInitializeSecurity
MkParseDisplayName
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoRegisterMessageFilter
oleaut32
SetErrorInfo
SafeArrayGetLBound
VariantInit
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayPutElement
VariantClear
SafeArrayCreate
UnRegisterTypeLi
LoadTypeLibEx
SafeArrayDestroy
SysAllocStringLen
SysAllocString
SysStringLen
SysAllocStringByteLen
LoadTypeLi
VariantCopy
SysFreeString
LoadRegTypeLi
VariantChangeType
CreateErrorInfo
SafeArrayCopy
imm32
ImmGetDefaultIMEWnd
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_ftol
_itow
_endthread
_beginthread
sprintf
free
malloc
wcsrchr
tmpnam
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE