Static task
static1
Behavioral task
behavioral1
Sample
ead08a0790bf223e4ab7ad1785aaa5c0288bf479753207b11892bc0e5830117e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ead08a0790bf223e4ab7ad1785aaa5c0288bf479753207b11892bc0e5830117e.exe
Resource
win10v2004-20220901-en
General
-
Target
ead08a0790bf223e4ab7ad1785aaa5c0288bf479753207b11892bc0e5830117e
-
Size
581KB
-
MD5
0e73ae438041c4607132b18830be98d0
-
SHA1
a6792706c0243746bba544e717c35e24e715e8d7
-
SHA256
ead08a0790bf223e4ab7ad1785aaa5c0288bf479753207b11892bc0e5830117e
-
SHA512
cf0d14cbc15f32e542479e95b7d7029f1d746811b7e26ed2341171301348672daeb4c9dffe0d1d25b582a415200539c61f6b8cf9141c4e9584e12068560b1c24
-
SSDEEP
6144:lWLddUgXGJjijm2+9dTQ+/CJcsr8bOmcIHH+jzTyqoB7AXwB2J0HUQFPSyklyU63:lOrQJPQJR+Hy/yqGMqH3lSyBU6SPaG+
Malware Config
Signatures
Files
-
ead08a0790bf223e4ab7ad1785aaa5c0288bf479753207b11892bc0e5830117e.exe windows x86
8fee74aad97ca6d4da74fb5bd0aa4dce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
GetFileType
GetStdHandle
SetPriorityClass
OpenProcess
GetCurrentProcessId
FindClose
FindFirstFileA
FormatMessageA
LoadLibraryA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetLastError
GetDriveTypeA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
MultiByteToWideChar
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
GetFullPathNameA
GetCurrentDirectoryA
VirtualFree
VirtualAlloc
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ