Static task
static1
Behavioral task
behavioral1
Sample
ec88cafb6dc98dbb7ef9a093324a1d093ae14bfa6a43d4771a58f3bcd881a88c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec88cafb6dc98dbb7ef9a093324a1d093ae14bfa6a43d4771a58f3bcd881a88c.exe
Resource
win10v2004-20220812-en
General
-
Target
ec88cafb6dc98dbb7ef9a093324a1d093ae14bfa6a43d4771a58f3bcd881a88c
-
Size
366KB
-
MD5
a0c92a53439fb85a00c12d8f8a10c716
-
SHA1
60dfcc376c4c0ef4d73ba959a4a645001363439d
-
SHA256
ec88cafb6dc98dbb7ef9a093324a1d093ae14bfa6a43d4771a58f3bcd881a88c
-
SHA512
6bf06ec249cda09663f070d6cf2cc8d0e8e331a2c7dfec092525b7f45d9f7292d2b3bfce3640fde7c1dcf983f5f4bb6f1115210386ca6ddc84070011bcc5acaa
-
SSDEEP
6144:9B7XAiJ1Pd4m1EXrN4xHT136PaAFybfEO5X9DRaAGLwVe43fiuKKQRUb2/8Jfln6:P7XAY/1E7N63Qa7E5R0VdDz1b2kJflQ
Malware Config
Signatures
Files
-
ec88cafb6dc98dbb7ef9a093324a1d093ae14bfa6a43d4771a58f3bcd881a88c.exe windows x86
a344a1e90d09683c359bd3dac30c4b48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaA
EnumWindows
SetWindowTextA
GetActiveWindow
DialogBoxParamA
SetWindowTextW
SetDlgItemTextW
GetWindowThreadProcessId
ole32
CoRevokeClassObject
comctl32
InitCommonControlsEx
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
kernel32
HeapDestroy
GetNumberOfConsoleMouseButtons
IsBadReadPtr
IsValidLanguageGroup
SetFileAttributesA
GetTickCount
HeapFree
LoadResource
FindResourceA
LocalAlloc
LoadLibraryA
FreeLibrary
GetProcAddress
GetModuleHandleA
HeapCreate
DeleteCriticalSection
InitializeCriticalSection
LocalFree
GetDateFormatA
Sections
.text Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE