Static task
static1
Behavioral task
behavioral1
Sample
ea1749839a8789883d33bfd082eaae2dda2c9ea5118a6b71e9f3fc823edb7d74.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea1749839a8789883d33bfd082eaae2dda2c9ea5118a6b71e9f3fc823edb7d74.exe
Resource
win10v2004-20220812-en
General
-
Target
ea1749839a8789883d33bfd082eaae2dda2c9ea5118a6b71e9f3fc823edb7d74
-
Size
136KB
-
MD5
837fcd048c848ff2a9359d335d505a1b
-
SHA1
6098e1971ef196e96f9d20bdb736bb0fc075f74c
-
SHA256
ea1749839a8789883d33bfd082eaae2dda2c9ea5118a6b71e9f3fc823edb7d74
-
SHA512
3ab4c04d4c38a00241790893f4caa62ddd31644c178202460f912b0d7e731613352cdb58302170b6513cf726cfaff655937da93c7895340a5572788aa5476fec
-
SSDEEP
3072:4W8P9iEc6DdbRYRHeJsqUo68QEz+ldQKCD:R8MR6DdC+JZRQdQ
Malware Config
Signatures
Files
-
ea1749839a8789883d33bfd082eaae2dda2c9ea5118a6b71e9f3fc823edb7d74.exe windows x86
dbb00f48d0d9580a54a1b8bc06be59bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetSystemInfo
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
ExitProcess
GetOEMCP
GetCPInfo
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalFlags
InterlockedDecrement
InterlockedIncrement
lstrcatA
WritePrivateProfileStringA
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CloseHandle
GlobalAddAtomA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
LoadLibraryA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CopyFileA
MultiByteToWideChar
FreeEnvironmentStringsW
lstrcpyA
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
SetWindowLongA
GetDlgItem
GetSystemMetrics
GetSysColorBrush
UnregisterClassA
GetSysColor
ReleaseDC
GetDC
GrayStringA
AdjustWindowRectEx
PostMessageA
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowTextA
SetWindowTextA
GetClassNameA
wsprintfA
LoadCursorA
GetCapture
ClientToScreen
GetMenuItemID
CopyRect
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetFocus
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
ExtTextOutA
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateBitmap
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
Escape
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ