Static task
static1
Behavioral task
behavioral1
Sample
ebebe60fb2c4f09d424816102b3640610e0a3a03e34300ec1f0297540d68ef4f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebebe60fb2c4f09d424816102b3640610e0a3a03e34300ec1f0297540d68ef4f.exe
Resource
win10v2004-20220812-en
General
-
Target
ebebe60fb2c4f09d424816102b3640610e0a3a03e34300ec1f0297540d68ef4f
-
Size
312KB
-
MD5
baab0a7e3a86a4fec18161b09fa8d2bf
-
SHA1
126eba1e695f27bee1054227da835b24b85a2c91
-
SHA256
ebebe60fb2c4f09d424816102b3640610e0a3a03e34300ec1f0297540d68ef4f
-
SHA512
6f3821c52b2010ca627df4ac070af9f063ccf9e536cb4cd4b6c280a415234ffe7f69d3c81dc46eb261224f316e86ff55c8c750307d03e430a7baf3bec64668f1
-
SSDEEP
6144:Of8xNskOkEzj7Q+U4adeZFz+1sk89aJymesjR4EdLoa0SH6HAy/H6H9OSmQtLpWy:OEFKQnsPadtB0brCHPpLoxK
Malware Config
Signatures
Files
-
ebebe60fb2c4f09d424816102b3640610e0a3a03e34300ec1f0297540d68ef4f.exe windows x86
df85df83711ee67640b3f582c92cd521
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapVirtualKeyW
DestroyWindow
MessageBoxExA
IsChild
MessageBoxIndirectA
LoadIconW
DefWindowProcA
DrawIcon
GetScrollRange
MessageBoxW
ShowWindow
DefWindowProcW
CharToOemA
ReplyMessage
RegisterDeviceNotificationW
RegisterClassA
GetWindowTextW
DrawTextExA
SetThreadDesktop
InsertMenuItemW
GetMenuItemRect
RegisterClassExA
GetKeyState
CreateWindowExA
comdlg32
GetOpenFileNameW
shell32
DoEnvironmentSubstA
SHBrowseForFolderW
FindExecutableA
ExtractIconExW
SHBrowseForFolder
comctl32
ImageList_DragShowNolock
ImageList_Copy
ImageList_SetDragCursorImage
ImageList_Write
ImageList_DrawEx
CreateStatusWindow
ImageList_DrawIndirect
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetImageInfo
ImageList_LoadImageW
InitCommonControlsEx
ImageList_GetImageRect
ImageList_DragMove
ImageList_Add
ImageList_BeginDrag
DestroyPropertySheetPage
advapi32
RegEnumKeyA
CryptGetDefaultProviderW
CryptDuplicateHash
CryptSetProviderExW
LookupPrivilegeNameW
CryptExportKey
LookupPrivilegeNameA
CryptVerifySignatureA
RegQueryInfoKeyW
RegEnumKeyW
kernel32
TlsSetValue
FillConsoleOutputAttribute
LCMapStringW
GlobalHandle
ReadConsoleW
SetLastError
EnumTimeFormatsW
InterlockedDecrement
LeaveCriticalSection
CompareStringA
MultiByteToWideChar
GetPrivateProfileSectionW
TlsGetValue
GetLocalTime
WriteFile
InitializeCriticalSection
GetStartupInfoA
SetEnvironmentVariableW
SetFileAttributesW
OpenMutexA
HeapDestroy
IsBadWritePtr
GetStringTypeW
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetStdHandle
DeleteAtom
HeapAlloc
SetFilePointer
GetOEMCP
ReleaseMutex
ReadFile
GetFileType
GetModuleFileNameA
HeapFree
WideCharToMultiByte
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStringTypeA
CommConfigDialogW
GetCurrentThreadId
EnumSystemCodePagesA
TerminateProcess
GetVersion
TlsFree
GetCPInfo
CompareStringW
InterlockedIncrement
LoadLibraryA
HeapReAlloc
InterlockedExchange
EnterCriticalSection
VirtualQuery
CloseHandle
GetEnvironmentStringsW
CreateMutexA
GetEnvironmentStrings
GetStdHandle
GetModuleHandleA
FlushFileBuffers
FreeEnvironmentStringsW
VirtualFree
HeapCreate
RtlUnwind
TlsAlloc
ExitProcess
DeleteCriticalSection
LCMapStringA
VirtualAlloc
GetCurrentProcess
RaiseException
GetCurrentProcessId
GetACP
TransactNamedPipe
EnumSystemLocalesW
FreeEnvironmentStringsA
GetTickCount
GetCommandLineA
GetProcAddress
GetCurrentThread
GetTimeZoneInformation
CreateRemoteThread
WritePrivateProfileStringA
SetHandleCount
GetSystemTime
QueryPerformanceCounter
GetDateFormatW
GetLastError
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ