Static task
static1
Behavioral task
behavioral1
Sample
ea2426548224f4512cf2ee947a84d2f8e7c0f4bac3024bfe2e24e69e29a2c6aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea2426548224f4512cf2ee947a84d2f8e7c0f4bac3024bfe2e24e69e29a2c6aa.exe
Resource
win10v2004-20220812-en
General
-
Target
ea2426548224f4512cf2ee947a84d2f8e7c0f4bac3024bfe2e24e69e29a2c6aa
-
Size
111KB
-
MD5
64bf5b566937cdbdfa6f659405cc409c
-
SHA1
d1b329accdabbfe527469e626ad8f2627b5f7d8d
-
SHA256
ea2426548224f4512cf2ee947a84d2f8e7c0f4bac3024bfe2e24e69e29a2c6aa
-
SHA512
0dcec5cd37f6c950186e7e77a95c8f1d34075eb67881a904795f8216ee7de00286b1c68013d9a9c399df45e3f3964eb072cab95ea010b50f8fe3ca4bc9dce7b8
-
SSDEEP
1536:sFlX2AKQpKRxL/VbUFNUrRwlUPWoidPvVoMOiFuD1uFB3cpKoTWvbi0:2XxKQpKJ4MROUOTVoPsnFB3XoTObi0
Malware Config
Signatures
Files
-
ea2426548224f4512cf2ee947a84d2f8e7c0f4bac3024bfe2e24e69e29a2c6aa.exe windows x86
8189989a4cea6d12bac2f4d1903d1c9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleRun
CLSIDFromString
WriteClassStm
CoCreateInstanceEx
CoRegisterClassObject
user32
PeekMessageA
GetWindow
ShowWindow
SetWindowPlacement
IsDialogMessageA
DrawIcon
GetMenu
RegisterClassA
IntersectRect
DefMDIChildProcA
GetClipboardData
DispatchMessageW
OpenClipboard
wsprintfA
DestroyWindow
GetWindowRect
ChildWindowFromPoint
SetCursor
GetPropA
ScrollWindow
MoveWindow
GetSubMenu
GetKeyState
GetActiveWindow
SetWindowLongA
DestroyIcon
KillTimer
UnhookWindowsHookEx
EnumChildWindows
ReleaseDC
GetCursorPos
GetMessagePos
CheckMenuItem
SetForegroundWindow
DeleteMenu
GetScrollPos
ClientToScreen
LoadKeyboardLayoutA
GetWindowDC
DrawAnimatedRects
GetScrollRange
MessageBoxA
LoadIconA
CharLowerBuffA
CreateWindowExA
LoadCursorA
GetCursor
RemovePropA
InsertMenuA
GetMenuState
GetScrollInfo
GetIconInfo
InflateRect
InvalidateRect
MessageBeep
SetTimer
SetWindowPos
SetPropA
GetClientRect
EnableWindow
RedrawWindow
GetSysColorBrush
DrawTextA
CharToOemA
SetCapture
GetKeyboardState
SetWindowTextA
RegisterWindowMessageA
DestroyCursor
ShowOwnedPopups
BeginPaint
SetWindowLongW
GetClassLongA
IsRectEmpty
OemToCharA
DefWindowProcA
GetClassNameA
LoadStringA
GetWindowPlacement
PostMessageA
IsWindowVisible
CallNextHookEx
IsZoomed
DrawFrameControl
SetClipboardData
GetDCEx
TranslateMessage
SetWindowsHookExA
RegisterClipboardFormatA
GetKeyNameTextA
EnableScrollBar
SetScrollInfo
IsWindowUnicode
TranslateMDISysAccel
SetScrollPos
GetSystemMenu
AdjustWindowRectEx
GetDlgItem
OffsetRect
DestroyMenu
FillRect
GetLastActivePopup
FrameRect
ReleaseCapture
DefFrameProcA
IsIconic
CharUpperBuffA
SetScrollRange
GetClassInfoA
DispatchMessageA
ShowScrollBar
GetMenuItemCount
GetFocus
EmptyClipboard
CharNextA
GetSystemMetrics
PtInRect
GetWindowLongA
MapWindowPoints
GetDC
CreateIcon
PostQuitMessage
WaitMessage
GetCapture
GetWindowLongW
WindowFromPoint
SetMenuItemInfoA
GetForegroundWindow
gdi32
SelectObject
SetBkColor
BitBlt
GetObjectA
CreateDIBSection
GetDIBColorTable
CreateCompatibleBitmap
SetPixel
oleaut32
SysAllocStringLen
SysStringLen
VariantChangeType
RegisterTypeLib
SafeArrayPtrOfIndex
OleLoadPicture
SafeArrayGetElement
comdlg32
ChooseColorA
kernel32
SetLastError
GetCPInfo
lstrcpynA
GlobalAlloc
GlobalFindAtomA
GetTickCount
MulDiv
LoadLibraryExA
RaiseException
GetModuleHandleA
GetProcAddress
GetThreadLocale
MoveFileExA
CompareStringA
GetFileSize
GetDateFormatA
GetProcessHeap
ExitThread
LockResource
LoadLibraryA
LocalReAlloc
GetFileAttributesA
VirtualFree
GetStdHandle
FindClose
SizeofResource
Sleep
SetHandleCount
FormatMessageA
MoveFileA
LoadResource
InitializeCriticalSection
LocalAlloc
FindFirstFileA
GetModuleFileNameA
SetEvent
VirtualAllocEx
lstrcmpiA
DeleteFileA
GetLocalTime
FreeLibrary
GetStringTypeW
VirtualQuery
lstrcatA
GetSystemDefaultLangID
GlobalAddAtomA
GetCurrentThreadId
GetLastError
lstrcmpA
HeapAlloc
GetStringTypeA
GetUserDefaultLCID
EnumCalendarInfoA
ResetEvent
WideCharToMultiByte
CreateThread
GetCommandLineA
SetFilePointer
GetCurrentThread
lstrlenA
WriteFile
CreateFileA
FreeResource
HeapDestroy
GetLocaleInfoA
SetEndOfFile
msvcrt
log
memcpy
memmove
asin
mbstowcs
advapi32
RegEnumKeyA
RegEnumKeyExA
RegQueryValueExA
RegCreateKeyA
shell32
SHFileOperationA
SHGetFolderPathA
SHGetFileInfoA
SHGetDiskFreeSpaceA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 623B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 314B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE