Static task
static1
Behavioral task
behavioral1
Sample
eac622ecdb8d36321ccdedd9f0b7516d1f39b1abffb19a5a145e6139b0f336ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eac622ecdb8d36321ccdedd9f0b7516d1f39b1abffb19a5a145e6139b0f336ba.exe
Resource
win10v2004-20221111-en
General
-
Target
eac622ecdb8d36321ccdedd9f0b7516d1f39b1abffb19a5a145e6139b0f336ba
-
Size
584KB
-
MD5
e096aaae61bd3ec3a2ede33830cac499
-
SHA1
3a8618b80393e271f7a061c6529a1b936ff36833
-
SHA256
eac622ecdb8d36321ccdedd9f0b7516d1f39b1abffb19a5a145e6139b0f336ba
-
SHA512
dcb4ccd67498e878c2a04f6443fb8575b3b4502594a107868ead4a20f9c1bb8598bbabfee5c97e0fea6f34e672a9c5f8e4e776d56be73f7878ad0f298f3893f3
-
SSDEEP
6144:LJ/XZethOMM6q0Q67P9cWo5kcwFN/55vYYr9M7KivYWzwASNXg2xkIs0IOyBaxZ6:t/Xwt0MM6q0Q6j9cWGavQbMjgakINgK
Malware Config
Signatures
Files
-
eac622ecdb8d36321ccdedd9f0b7516d1f39b1abffb19a5a145e6139b0f336ba.exe windows x86
c72a34781e14dbe5ad849bbf454c10e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalAlloc
DeviceIoControl
GetStringTypeA
GetOEMCP
GetACP
InterlockedExchange
RtlUnwind
GetCPInfo
GetLocaleInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
GetStdHandle
ExitProcess
LCMapStringW
LCMapStringA
VirtualQuery
GetSystemInfo
VirtualProtect
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetProcessHeap
GetCommandLineA
HeapAlloc
HeapFree
MultiByteToWideChar
GetTempPathA
lstrcatA
GetFileAttributesA
LoadLibraryA
GetPrivateProfileStringA
FreeLibrary
FindResourceA
LoadResource
SizeofResource
LockResource
CreateProcessA
lstrcpyA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CreateFileA
WriteFile
lstrlenA
lstrcmpiA
GetTickCount
WaitForMultipleObjects
CloseHandle
SetEvent
WaitForSingleObject
SearchPathA
lstrcmpA
CreateMutexA
GetLastError
GetVersionExA
Sleep
WinExec
CreateEventA
CreateThread
GetModuleFileNameA
GetStringTypeW
user32
InsertMenuItemA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
ShowWindow
LoadStringA
LoadImageA
DialogBoxParamA
CharUpperA
IsDlgButtonChecked
EndDialog
GetParent
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
CreateWindowExA
SystemParametersInfoA
GetDC
GetMenuCheckMarkDimensions
ReleaseDC
CreatePopupMenu
GetSysColor
GetCursorPos
TrackPopupMenu
DestroyMenu
PostQuitMessage
PostMessageA
SetForegroundWindow
DefWindowProcA
GetDesktopWindow
GetWindow
GetClassNameA
SendMessageA
LoadIconA
LoadCursorA
RegisterClassA
gdi32
CreateCompatibleDC
BitBlt
DeleteDC
CreatePen
MoveToEx
LineTo
CreateBrushIndirect
Rectangle
GetTextColor
SetTextColor
GetBkMode
SetBkMode
SetTextAlign
ExtTextOutA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
DeleteObject
GetTextAlign
advapi32
RegEnumKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyA
shell32
Shell_NotifyIconA
setupapi
SetupDiSetClassInstallParamsA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiGetClassDevsA
SetupDiGetDeviceInstanceIdA
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
winmm
mixerGetNumDevs
mixerSetControlDetails
mixerGetLineInfoA
mixerGetLineControlsA
mixerGetControlDetailsA
mixerGetID
mixerGetDevCapsA
mixerOpen
mixerClose
hid
HidD_FreePreparsedData
HidD_GetPreparsedData
HidD_GetAttributes
HidD_GetHidGuid
HidP_GetCaps
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 520KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE