Static task
static1
Behavioral task
behavioral1
Sample
eaf07dda47433bd059fc49db493638dd3c55f4a57517015e32c63677c3a1ac88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eaf07dda47433bd059fc49db493638dd3c55f4a57517015e32c63677c3a1ac88.exe
Resource
win10v2004-20221111-en
General
-
Target
eaf07dda47433bd059fc49db493638dd3c55f4a57517015e32c63677c3a1ac88
-
Size
392KB
-
MD5
390c721f027d702bc433d253cee3f11f
-
SHA1
522bb13823382f69c13e30e783090a0d6ed55bb5
-
SHA256
eaf07dda47433bd059fc49db493638dd3c55f4a57517015e32c63677c3a1ac88
-
SHA512
e72f4681621975181d3996cd5551596530d23da1e7b41f0bd2355d078309b2f4b1e8b7298261b78fdb6ba81122c0002e3b311d36ee8128f4a98ac671e5e6937d
-
SSDEEP
12288:IxckX6NkilpkQNlcXhmRs4JuANs3e4JhyZZ:ImpNVTkyOcRsguV3e4v4Z
Malware Config
Signatures
Files
-
eaf07dda47433bd059fc49db493638dd3c55f4a57517015e32c63677c3a1ac88.exe windows x86
85d45eb5ab38167e1ee1fa4b55f420a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memset
memcmp
memcpy
_strcmpi
_strlwr
msvcrt
vsprintf
strlen
wcscpy
wcscat
free
strstr
malloc
??3@YAXPAX@Z
??2@YAPAXI@Z
strcpy
kernel32
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
WriteFile
SetFileTime
GetCurrentProcess
DuplicateHandle
CreateFileW
CreateFileA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryA
CreateDirectoryW
CreateDirectoryA
GetLastError
lstrcpyA
lstrlenA
LocalFileTimeToFileTime
lstrcmpA
ReadFile
SetFilePointer
GlobalFree
GlobalAlloc
SystemTimeToFileTime
GetWindowsDirectoryA
MultiByteToWideChar
lstrcmpiA
FreeLibrary
VirtualFree
IsBadReadPtr
LoadLibraryA
EnumTimeFormatsA
CloseHandle
GetLocalTime
SetThreadAffinityMask
ExitProcess
GetVersionExA
GetModuleFileNameA
GetProcAddress
VirtualAlloc
VirtualProtect
HeapAlloc
user32
PeekMessageA
SetWindowTextA
CloseWindow
DialogBoxParamA
ShowWindow
SendMessageA
gdi32
CreateBitmap
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ