Static task
static1
Behavioral task
behavioral1
Sample
eb96b445b5afd0076fa7af54d9422dc5a7b8867e0d1618e656d6eae2c6f09a4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb96b445b5afd0076fa7af54d9422dc5a7b8867e0d1618e656d6eae2c6f09a4e.exe
Resource
win10v2004-20220812-en
General
-
Target
eb96b445b5afd0076fa7af54d9422dc5a7b8867e0d1618e656d6eae2c6f09a4e
-
Size
858KB
-
MD5
1111344836ec6ef58349c08e34eaeb39
-
SHA1
1fca818bc8eaefc71e9c971a590a0c57ea2d94ba
-
SHA256
eb96b445b5afd0076fa7af54d9422dc5a7b8867e0d1618e656d6eae2c6f09a4e
-
SHA512
545edf96d540ef0f417e01dbd3b040d96920d6361738d6aacc7e0d13a0b37e829d27faaefb71a5615a184d594ca0420861bb6ea38d0b5a49e424a28e8c427709
-
SSDEEP
24576:a/Cdr+vdsMnlPuypwF8KM+VazVG2f3Ti:a/CIdnlPNPdpPf3Ti
Malware Config
Signatures
Files
-
eb96b445b5afd0076fa7af54d9422dc5a7b8867e0d1618e656d6eae2c6f09a4e.exe windows x86
b3802c771756ad7415a54dd6a2cc2c88
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ifsutil
??1CANNED_SECURITY@@UAE@XZ
?QueryDisjointRangeAndAssignBuffer@TLINK@@QAEPAXPAVBIG_INT@@PAG1PAXK2@Z
?GetSortedNext@TLINK@@QAEPAXPAX@Z
?Verify@IO_DP_DRIVE@@QAEEVBIG_INT@@0PAVNUMBER_SET@@@Z
??0VOL_LIODPDRV@@IAE@XZ
?Initialize@SECRUN@@QAEEPAVMEM@@PAVIO_DP_DRIVE@@VBIG_INT@@K@Z
??0NUMBER_SET@@QAE@XZ
?GetSortedFirst@TLINK@@QAEPAXXZ
?QueryChildren@DIGRAPH@@QBEEKPAVNUMBER_SET@@@Z
?ForceAutochk@VOL_LIODPDRV@@QAEEEKKGPBVWSTRING@@@Z
?QueryParentsWithChildren@DIGRAPH@@QBEEPAVNUMBER_SET@@K@Z
?AddDriveName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
??1LOG_IO_DP_DRIVE@@UAE@XZ
??1DIGRAPH@@UAE@XZ
??1TLINK@@UAE@XZ
??1INTSTACK@@UAE@XZ
?IsEntryPresent@AUTOREG@@SGEPBVWSTRING@@@Z
?Sort@TLINK@@QAEXXZ
??0SECRUN@@QAE@XZ
?GetData@TLINK@@QAEAAVBIG_INT@@PAX@Z
?RemoveEdge@DIGRAPH@@QAEEKK@Z
?NtDriveNameToDosDriveName@IFS_SYSTEM@@SGEPBVWSTRING@@PAV2@@Z
?DismountVolume@IFS_SYSTEM@@SGEPBVWSTRING@@@Z
?EnableFileSystem@IFS_SYSTEM@@SGEPBVWSTRING@@@Z
?QueryVolumeName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
kernel32
ReleaseMutex
TermsrvAppInstallMode
HeapUnlock
CopyLZFile
SetUnhandledExceptionFilter
GetConsoleAliasExesLengthA
GlobalGetAtomNameA
GetProcessShutdownParameters
IsValidCodePage
CreateMemoryResourceNotification
FlushConsoleInputBuffer
SetCommConfig
ReadFileEx
OpenEventA
Process32FirstW
GetConsoleAliasesLengthW
FindAtomW
VirtualAlloc
GlobalUnfix
AddRefActCtx
GetProcessHeap
SetConsoleScreenBufferSize
GetConsoleWindow
SetMailslotInfo
GetVersion
GetTapePosition
CreateActCtxW
GetProcessPriorityBoost
CreateFileMappingW
ProcessIdToSessionId
SetTapePosition
GetACP
InitializeCriticalSection
GlobalFindAtomW
_lcreat
EnumSystemCodePagesW
VerifyVersionInfoA
HeapSummary
GetSystemWindowsDirectoryW
LoadLibraryA
SetThreadUILanguage
AllocateUserPhysicalPages
BackupSeek
GetPriorityClass
CreateSemaphoreA
GetBinaryTypeA
SetConsoleOS2OemFormat
SetConsoleOutputCP
GetFileTime
gdi32
EngGetPrinterDataFileName
GdiSetLastError
GetEnhMetaFileDescriptionW
EngCreateDeviceSurface
EngBitBlt
GdiEndPageEMF
DdEntry31
GetBkMode
CreateEllipticRgn
GdiDllInitialize
GdiSetAttrs
GdiQueryFonts
DdEntry21
CreateFontW
OffsetRgn
GetObjectType
DeleteDC
GdiFullscreenControl
Sections
.text Size: 742KB - Virtual size: 741KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ