Static task
static1
Behavioral task
behavioral1
Sample
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe
Resource
win10v2004-20220812-en
General
-
Target
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b
-
Size
426KB
-
MD5
9174dc541108b06d7a4e201b34e70e68
-
SHA1
95421cecceff6b2a04f78b7167d5d8e4cdbe2f73
-
SHA256
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b
-
SHA512
7dd56a9b09dd709b65f77d032cf6318d0e41bc5c2642d0a0d48ee2efd1ee5ec2a42a3fdc11649346ca278b61ec1406812f23ef750cb21ad8d934dca9a152e2a7
-
SSDEEP
6144:NH4R4IvKwrAcdOVtGbHPwPwouoU2V2zTpxyN90vElFsa:NH4R4IvKkA+OabHml2Py90CCa
Malware Config
Signatures
Files
-
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe windows x86
d98971773887eb457ea4955a97997944
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegQueryValueExA
RegFlushKey
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExA
kernel32
GetTempPathW
RemoveDirectoryW
FindNextFileW
lstrcmpW
GetCommandLineW
SetCurrentDirectoryW
GlobalFree
GetModuleFileNameW
TlsFree
TlsAlloc
TlsSetValue
TlsGetValue
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
VerifyVersionInfoW
VerSetConditionMask
GetFullPathNameW
CopyFileW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
lstrlenA
lstrlenW
GetThreadLocale
GetModuleHandleW
GetProcAddress
GetCurrentProcess
WriteFile
CreateFileW
SetFilePointer
FindFirstFileW
FindClose
SetLastError
LoadLibraryExW
IsProcessorFeaturePresent
GlobalMemoryStatus
CompareStringW
CompareStringA
FormatMessageW
LocalFree
ExpandEnvironmentStringsW
MultiByteToWideChar
WideCharToMultiByte
GetVersion
GetTimeZoneInformation
GetSystemTime
SystemTimeToTzSpecificLocalTime
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
OpenSemaphoreW
WaitForSingleObject
ReleaseSemaphore
CloseHandle
SetErrorMode
GetVersionExW
GetLastError
FreeLibrary
GetCommandLineA
GetVersionExA
GetStartupInfoA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetModuleHandleA
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
InterlockedIncrement
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateFileA
OutputDebugStringA
GetSystemInfo
ole32
CoUninitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleRun
CoInitializeEx
shell32
CommandLineToArgvW
SHCreateDirectoryExW
user32
CharNextA
MessageBoxW
CharUpperA
CharUpperW
CharLowerA
CharLowerW
shlwapi
PathGetCharTypeW
wintrust
WinVerifyTrust
dbghelp
SymGetSymFromAddr64
SymInitialize
SymGetLineFromAddr64
oleaut32
GetErrorInfo
VariantChangeType
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
VariantInit
VariantClear
msi
ord8
ord159
ord160
ord110
ord117
ord91
ord67
ord172
ord180
ord95
ord31
ord65
ord71
ord141
Sections
.text Size: 303KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ