Static task
static1
Behavioral task
behavioral1
Sample
ed0e12ff5c3ae7e0a50dc28f8324d779d5ffafd7406c6b2fd1b917d22babf726.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed0e12ff5c3ae7e0a50dc28f8324d779d5ffafd7406c6b2fd1b917d22babf726.exe
Resource
win10v2004-20220812-en
General
-
Target
ed0e12ff5c3ae7e0a50dc28f8324d779d5ffafd7406c6b2fd1b917d22babf726
-
Size
208KB
-
MD5
936117c288a367531a99454010a931b1
-
SHA1
7a1a8554fef02ab948ebda3be3fc8f532db30607
-
SHA256
ed0e12ff5c3ae7e0a50dc28f8324d779d5ffafd7406c6b2fd1b917d22babf726
-
SHA512
cf6ca9852b7bcfb11627652e26347b437f618423e40bd4ea9dab1183b140e0268a9e20514353a522aec324008bbc2fd878fdd52b4d44772ce045416c32814588
-
SSDEEP
6144:1el+0LCmoR68643ryrZoIfel36q0QqvceN47i:1L0LCm668643ryrZoEel3t0zcfi
Malware Config
Signatures
Files
-
ed0e12ff5c3ae7e0a50dc28f8324d779d5ffafd7406c6b2fd1b917d22babf726.exe windows x86
15378285981e400e15e65ce35468ce81
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
lstrcpyA
WaitForSingleObject
CreateFileW
GetACP
CreateThread
InterlockedDecrement
lstrlenW
GetCurrentProcess
GetSystemTimeAsFileTime
ReleaseSemaphore
WaitForMultipleObjects
GlobalAlloc
HeapFree
GlobalLock
lstrcmpiW
SetUnhandledExceptionFilter
GetFileAttributesW
GetCurrentThread
GetProfileIntA
MultiByteToWideChar
GetPrivateProfileStringW
InterlockedIncrement
lstrlenA
QueryPerformanceCounter
SetThreadPriority
GlobalFree
GetLastError
GetFileSize
GetDiskFreeSpaceW
IsBadCodePtr
HeapAlloc
CreateSemaphoreW
VirtualFree
WriteFile
GetLocaleInfoW
LeaveCriticalSection
GetQueuedCompletionStatus
InterlockedExchange
GetProcessHeap
GetThreadPriority
CloseHandle
LoadLibraryW
GetCurrentProcessId
GetVersionExW
GlobalUnlock
GetTickCount
IsBadReadPtr
lstrcpynW
MulDiv
EnterCriticalSection
GetLocaleInfoA
WideCharToMultiByte
GetFullPathNameW
ResetEvent
SetEndOfFile
ReadFile
DeleteCriticalSection
GetModuleFileNameA
InitializeCriticalSection
GlobalMemoryStatus
GetProcAddress
GlobalFindAtomA
CreateEventW
SetEvent
IsBadWritePtr
GlobalHandle
lstrcpyW
SetFilePointer
FreeLibrary
user32
LoadStringW
DestroyWindow
CheckDlgButton
GetWindowLongW
DefWindowProcW
EnableWindow
CreateDialogParamW
SetCursor
GetDlgItem
ShowWindow
GetAsyncKeyState
CheckRadioButton
ReleaseDC
GetDlgItemInt
SetDlgItemInt
GetDesktopWindow
InvalidateRect
SetDlgItemTextW
SendMessageW
IsWindowVisible
IsRectEmpty
SetWindowLongW
IsWindow
TranslateMessage
ClientToScreen
MoveWindow
PeekMessageW
GetWindowRect
DispatchMessageW
GetClientRect
LoadCursorW
GetDC
netshell
StartNCW
NcIsValidConnectionName
DllGetClassObject
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ