Static task
static1
Behavioral task
behavioral1
Sample
ebc145b71ed7cc358cf52db0710add0902080009d515615d951bc9babd442441.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebc145b71ed7cc358cf52db0710add0902080009d515615d951bc9babd442441.exe
Resource
win10v2004-20221111-en
General
-
Target
ebc145b71ed7cc358cf52db0710add0902080009d515615d951bc9babd442441
-
Size
96KB
-
MD5
428ef95be834ef620b03c81bf0f01ba0
-
SHA1
093c53b09c0a7b4db0be90817dff49f3fe398621
-
SHA256
ebc145b71ed7cc358cf52db0710add0902080009d515615d951bc9babd442441
-
SHA512
1aae5736f94b607a5e240fb7b2d2891a1b9c5b98def64b6ffac8a0d3d3c8024ef13676702f2eb0af051f13508d1f145989f7e0b0156a76d40ff02e6e8afa0b90
-
SSDEEP
1536:JulCrt28EElc4eOJsZhkTO74J7qfPq4uPs2E:JulgZEElTx2kTFKPq4L
Malware Config
Signatures
Files
-
ebc145b71ed7cc358cf52db0710add0902080009d515615d951bc9babd442441.exe windows x86
7ad8ba8a7b493c0c73d3fd58cb2558cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1168
ord800
ord858
ord924
ord860
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord1146
ord3619
ord3626
ord3663
ord795
ord765
ord2414
ord2645
ord4160
ord540
ord6453
ord2379
ord755
ord470
ord2370
ord3092
ord6199
ord5805
ord2243
ord2841
ord2448
ord537
ord535
ord2818
ord6663
ord5710
ord4129
ord941
ord6929
ord6927
ord6876
ord823
ord6648
ord6662
ord940
ord922
ord923
ord939
ord925
ord2763
ord2044
ord2107
ord5450
ord5834
ord6394
ord6930
ord6779
ord5683
ord3698
ord6055
ord1776
ord5290
ord3402
ord3721
ord567
ord2302
ord1105
ord6334
ord4224
ord1134
ord2621
ord2864
ord2514
ord641
ord815
ord825
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord2863
ord4673
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_iob
fflush
_tempnam
remove
_lseek
_close
_write
_read
_open
_errno
_ftol
_mbscmp
strncpy
time
localtime
strftime
fopen
fseek
ftell
getc
fprintf
fclose
strstr
_setmbcp
__CxxFrameHandler
free
malloc
_mbsrchr
sprintf
strchr
_controlfp
kernel32
lstrlenA
FindFirstFileA
lstrcpyA
DeleteFileA
CopyFileA
CreateDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetEnvironmentVariableA
RemoveDirectoryA
SetFileAttributesA
SearchPathA
lstrcmpA
Sleep
CloseHandle
FindNextFileA
CreateProcessA
GetProcAddress
OutputDebugStringA
lstrcatA
lstrcpynA
GetVersionExA
GetFileAttributesA
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileInformationByHandle
CreateFileA
LocalFree
FormatMessageA
GetModuleHandleA
GetStartupInfoA
LoadLibraryA
FindClose
FreeLibrary
ReleaseMutex
WaitForSingleObject
GetLastError
CreateMutexA
user32
IsIconic
MessageBoxA
wsprintfA
PostMessageA
GetSystemMetrics
LoadIconA
EnableWindow
LoadStringA
FindWindowA
GetLastActivePopup
GetClientRect
DrawIcon
GetSystemMenu
SendMessageA
SetForegroundWindow
AppendMenuA
gdi32
DeleteObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHFileOperationA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoTaskMemFree
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ekmq Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE