Static task
static1
Behavioral task
behavioral1
Sample
eb69ab4998ec7f33c571ff2b47c769727d771a1d3fa0ab494d823687b4402af2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb69ab4998ec7f33c571ff2b47c769727d771a1d3fa0ab494d823687b4402af2.exe
Resource
win10v2004-20221111-en
General
-
Target
eb69ab4998ec7f33c571ff2b47c769727d771a1d3fa0ab494d823687b4402af2
-
Size
285KB
-
MD5
4f590d329e7f0a4a9a375572de525614
-
SHA1
3a30c605b59a2b9e57bfd372bd84e70dd6ebaf04
-
SHA256
eb69ab4998ec7f33c571ff2b47c769727d771a1d3fa0ab494d823687b4402af2
-
SHA512
69e0a83e1e0fbac7805959c4db5f303edc47644b13c9821382a134855cc52bcc3543605c7d57e8014323c53e5cb411ed5f509fce37664171e197da0bc3d07c10
-
SSDEEP
6144:lfYyV5Iibc/POOOOtOOOOOOOOOOOOOOOOOOOO+OOOOOOOOOOOOOOOOOOOOmOOOOp:lfL54nOOOOtOOOOOOOOOOOOOOOOOOOOH
Malware Config
Signatures
Files
-
eb69ab4998ec7f33c571ff2b47c769727d771a1d3fa0ab494d823687b4402af2.exe windows x86
6d422cfb73268758a53cfb6c348b4da4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
AssocQueryStringA
wnsprintfA
StrNCatA
SHDeleteKeyA
StrToIntA
StrStrIA
userenv
GetProfilesDirectoryA
kernel32
GetTempPathA
DeleteFileA
lstrcpyA
SetFilePointer
SetEndOfFile
HeapFree
GetCurrentProcess
GetVersionExA
Sleep
GetModuleHandleA
GetVolumeInformationA
LocalFree
lstrcmpA
ExpandEnvironmentStringsA
OpenProcess
GlobalAlloc
GlobalFree
MultiByteToWideChar
ExitProcess
SetErrorMode
GetTickCount
CreateThread
SetLastError
GetSystemTimeAsFileTime
CloseHandle
InitializeCriticalSectionAndSpinCount
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
RtlUnwind
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FindNextFileA
GetModuleFileNameA
LoadLibraryA
FindClose
RemoveDirectoryA
GetProcAddress
lstrcmpiA
FindFirstFileA
VirtualQuery
lstrcatA
ReadFile
CreateProcessA
GetFileAttributesA
WriteFile
GetProcessHeap
HeapAlloc
FreeLibrary
MoveFileExA
lstrlenA
GetFileSize
CreateFileA
GetLastError
lstrcpynA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
RaiseException
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
user32
RegisterClassExA
PostQuitMessage
SendDlgItemMessageA
FillRect
LoadBitmapA
LoadIconA
SendMessageA
BeginPaint
IsDialogMessageA
GetWindowRect
MessageBoxA
GetWindowLongA
CreateWindowExA
GetDlgItem
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
AdjustWindowRectEx
SystemParametersInfoA
SetWindowTextA
UpdateWindow
LoadCursorA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
ExitWindowsEx
EndPaint
GetMessageA
DestroyWindow
TranslateMessage
gdi32
BitBlt
GetTextExtentPoint32A
SetTextColor
CreateFontA
SetBkMode
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateSolidBrush
TextOutA
DeleteDC
advapi32
AdjustTokenPrivileges
IsValidSid
GetSecurityDescriptorOwner
LookupPrivilegeValueA
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegEnumValueA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyA
OpenProcessToken
GetUserNameA
RegCreateKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
ord680
ShellExecuteExA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ