Static task
static1
Behavioral task
behavioral1
Sample
ee6bd4196830a60502b478fb303664c4981e384919120cf6bac803af9035e796.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee6bd4196830a60502b478fb303664c4981e384919120cf6bac803af9035e796.exe
Resource
win10v2004-20220812-en
General
-
Target
ee6bd4196830a60502b478fb303664c4981e384919120cf6bac803af9035e796
-
Size
814KB
-
MD5
a1da50ae3568f2b92b0002dd09bc0590
-
SHA1
625ce805648999c9c3e724dda08ddeacb1299b46
-
SHA256
ee6bd4196830a60502b478fb303664c4981e384919120cf6bac803af9035e796
-
SHA512
1574473cc6c262db613130ba6e3d8717c8f542304ac61d507534d85c529a8ddef14c47490eae39d2d0209ca4c915a6d126c8ac8431a7d7d2bb6ceeea1260a23e
-
SSDEEP
24576:E5Ahp49LcV2Lgt+HK3dvqW9ntRuANTQV3U6vS9H4wJU:EyrDdvqQnnuiTo3U6K9H4wJ
Malware Config
Signatures
Files
-
ee6bd4196830a60502b478fb303664c4981e384919120cf6bac803af9035e796.exe windows x86
3cf4cc9131c73d98c07f44033661ab02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
FileTimeToSystemTime
GetTimeZoneInformation
FileTimeToLocalFileTime
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
SetFileAttributesW
LocalFree
GetCurrentProcessId
DeleteFileW
OpenEventW
CreateWaitableTimerW
DeviceIoControl
CreateFileW
MoveFileExW
SetWaitableTimer
GetVersion
GetLastError
GetProcAddress
LoadLibraryW
GetSystemTimeAsFileTime
FreeLibrary
CreateThread
CloseHandle
WaitForMultipleObjects
CreateEventW
ResetEvent
Sleep
SetEvent
WaitForSingleObject
GetFileAttributesW
ReadFile
SetProcessWorkingSetSize
GetComputerNameW
GetModuleHandleW
GetVersionExW
GetACP
GetSystemInfo
CreateProcessW
OpenProcess
TerminateProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetLongPathNameW
GetShortPathNameW
ConnectNamedPipe
CreateNamedPipeW
WriteFile
DisconnectNamedPipe
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesExW
FindFirstFileW
FindClose
FindNextFileW
GetSystemWindowsDirectoryW
GetSystemDirectoryW
SetFilePointer
GetFileSizeEx
CreateDirectoryW
CompareFileTime
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GetFileTime
OutputDebugStringW
GetLocalTime
GetSystemTime
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
ExitThread
GetCurrentThreadId
GetCommandLineA
HeapSetInformation
HeapFree
RaiseException
GetCPInfo
RtlUnwind
HeapAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetStringTypeW
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
GetCurrentProcess
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
iphlpapi
_PfAddFiltersToInterface@24
GetIpAddrTable
_PfDeleteInterface@4
_PfMakeLog@4
_PfCreateInterface@24
_PfUnBindInterface@4
_PfBindInterfaceToIPAddress@12
_PfDeleteLog@0
_PfSetLogBuffer@28
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateProcessesW
WTSFreeMemory
WTSEnumerateSessionsW
mbam
_GetMBAMSettings@4
_LicenseIsValid@0
_GetProgramVersion@8
_GetRandomizationTime@0
mbamnet
_IsTrialActive@0
_ValidateTrial@16
_PerformUpdate@16
mbamcore
_SDKExclusionsEnumerate@8
_SDKCreate@12
_SDKExclusionsMigrate@8
_SDKExclusionsAdd@4
_SDKExclusionsIsExcluded@4
_SDKExclusionsWrite@4
_SDKQuarantine@4
_SDKQuarantineSetPath@4
_SDKSessionSetHeader@4
_SDKExclusionsRead@4
user32
CharLowerW
CharUpperA
CharUpperW
shell32
SHGetFolderPathW
advapi32
CryptGetHashParam
CryptAcquireContextW
CryptDeriveKey
CryptGenRandom
CryptDestroyHash
ReportEventW
DeregisterEventSource
RegisterEventSourceW
RegOpenCurrentUser
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
IsTextUnicode
OpenProcessToken
GetUserNameW
RevertToSelf
ImpersonateLoggedOnUser
DuplicateTokenEx
CryptHashData
CryptDecrypt
CreateProcessAsUserW
GetTokenInformation
SetEntriesInAclW
SetSecurityInfo
BuildTrusteeWithSidW
GetSecurityInfo
SetSecurityDescriptorDacl
ConvertStringSidToSidW
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
CryptEncrypt
CryptCreateHash
CryptDestroyKey
shlwapi
SHRegGetPathW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
userenv
DestroyEnvironmentBlock
GetDefaultUserProfileDirectoryW
GetUserProfileDirectoryW
ExpandEnvironmentStringsForUserW
GetProfilesDirectoryW
CreateEnvironmentBlock
mpr
WNetGetConnectionW
psapi
GetModuleFileNameExW
Sections
.text Size: 496KB - Virtual size: 495KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE