Static task
static1
Behavioral task
behavioral1
Sample
1ebeb6f96d7248e6c3f377c29389a56ebc10bfd071e9254a00b9618e26a836a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ebeb6f96d7248e6c3f377c29389a56ebc10bfd071e9254a00b9618e26a836a6.exe
Resource
win10v2004-20220812-en
General
-
Target
1ebeb6f96d7248e6c3f377c29389a56ebc10bfd071e9254a00b9618e26a836a6
-
Size
799KB
-
MD5
82e11849d3bcac0c5a6bdd68fca8fa80
-
SHA1
ef7dcfe7016c13c9b5fc2485b5d134c54a1bbcaa
-
SHA256
1ebeb6f96d7248e6c3f377c29389a56ebc10bfd071e9254a00b9618e26a836a6
-
SHA512
2fb3bfa7059309c1110c4c6e451f5e4121b69555a5973f1b7df7c76074b9601b09efc21eccb573dcd81ce5abdac8389c4a462b3f8669fc7deb51cc3983eae3a1
-
SSDEEP
24576:xcsrgDCaGLQZqDLjSU0tFremA3pyi0EsP:xcsr/L1jSUslKpx0
Malware Config
Signatures
Files
-
1ebeb6f96d7248e6c3f377c29389a56ebc10bfd071e9254a00b9618e26a836a6.exe windows x86
bb01197251059b51b6243c43de3f4200
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetDriveTypeA
HeapSize
GetProcessHeap
IsBadReadPtr
SuspendThread
GlobalSize
ResumeThread
GetCommandLineA
GetFileAttributesA
ResumeThread
WriteFile
CreatePipe
GetLocaleInfoA
GetModuleHandleA
CreateDirectoryA
GetPriorityClass
GetStdHandle
ReadConsoleW
SetLocalTime
VirtualProtect
DeleteFileA
user32
GetWindowLongA
GetWindowTextW
GetWindowLongA
SetFocus
wsprintfA
GetMessageA
DrawIcon
SetCursor
LoadCursorA
DispatchMessageA
DestroyMenu
SetRect
PeekMessageA
els
DllRegisterServer
DllGetClassObject
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE