Static task
static1
Behavioral task
behavioral1
Sample
eb252ac492edb589b208789e5e4c946d93ebf6b2cab9aeebea49f02d2fd01b29.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eb252ac492edb589b208789e5e4c946d93ebf6b2cab9aeebea49f02d2fd01b29.exe
Resource
win10v2004-20221111-en
General
-
Target
eb252ac492edb589b208789e5e4c946d93ebf6b2cab9aeebea49f02d2fd01b29
-
Size
268KB
-
MD5
7163356b4e0024ede6e7e1845b295933
-
SHA1
d22089a62e70e4e7f0155c12bbbc31d714682415
-
SHA256
eb252ac492edb589b208789e5e4c946d93ebf6b2cab9aeebea49f02d2fd01b29
-
SHA512
56d84c1a111baaf7d745506ea83bc667072b19dc60b5520f1f6d391910761291fb8898d743c8c55cef91ad19f93ce2e5ac90560d5a8209c27e56fe620e5feb0b
-
SSDEEP
6144:rbPzFyk4lW3tMQmrKVYwaRIIk5Ty+TvCNZvv3s56rSd:rLzNmQmII0mZj3s5O
Malware Config
Signatures
Files
-
eb252ac492edb589b208789e5e4c946d93ebf6b2cab9aeebea49f02d2fd01b29.exe windows x86
dbdb0c41ca4ca9ef58dc8739882353d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePalette
SetStretchBltMode
PlayMetaFile
CreateRoundRectRgn
PolylineTo
EqualRgn
ExtCreatePen
GetWindowExtEx
SetRectRgn
Polyline
GetTextCharacterExtra
MaskBlt
CreateCompatibleDC
GetPixel
SetBkColor
SetBoundsRect
AbortDoc
PolyPolyline
StretchBlt
OffsetClipRgn
Polygon
CreatePatternBrush
SetArcDirection
SelectObject
GetCurrentPositionEx
UpdateColors
PolyPolygon
DPtoLP
GetViewportOrgEx
GetTextExtentPointA
OffsetViewportOrgEx
GetGlyphOutlineA
CreateRectRgn
CreateDIBitmap
SelectClipPath
TextOutA
GetDeviceCaps
SetMapMode
SetTextCharacterExtra
SetPixelV
shlwapi
PathIsUNCA
PathStripToRootA
ole32
CoRegisterMessageFilter
CoFreeUnusedLibraries
ReadFmtUserTypeStg
CLSIDFromString
OleSetContainedObject
CoCreateInstance
CoLockObjectExternal
CoUninitialize
ReadClassStg
OleRun
OleUninitialize
OleIsCurrentClipboard
SetConvertStg
WriteClassStg
CoTreatAsClass
CoTaskMemFree
CoTaskMemAlloc
DoDragDrop
WriteFmtUserTypeStg
CreateItemMoniker
GetHGlobalFromILockBytes
OleDuplicateData
StgOpenStorage
ReleaseStgMedium
OleRegGetUserType
advapi32
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
SetServiceStatus
RegQueryInfoKeyW
RegDeleteValueW
InitializeSecurityDescriptor
CreateServiceW
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
winspool.drv
GetPrinterA
ClosePrinter
SetPrinterA
OpenPrinterA
ord204
DocumentPropertiesA
kernel32
IsValidLocale
TlsFree
GetTickCount
GetCurrentProcess
GetUserDefaultLCID
GetProcAddress
InitializeCriticalSection
FreeEnvironmentStringsW
TlsGetValue
HeapSize
GetLocaleInfoW
GetOEMCP
GetVersionExA
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
TerminateProcess
WriteConsoleW
GetTimeFormatA
RtlUnwind
GetDateFormatA
SetLastError
QueryPerformanceCounter
IsValidCodePage
MultiByteToWideChar
WideCharToMultiByte
GetFileType
GetLocaleInfoA
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
FreeLibrary
HeapAlloc
GetStartupInfoW
GetStringTypeA
GetCurrentThreadId
GetConsoleCP
GetStartupInfoA
GetModuleFileNameW
LoadLibraryA
WriteFile
VirtualQuery
LCMapStringW
Sleep
FreeEnvironmentStringsA
GetModuleFileNameA
RaiseException
IsDebuggerPresent
SetEnvironmentVariableA
GetEnvironmentStringsW
LCMapStringA
InterlockedIncrement
WriteConsoleA
GetCurrentThread
GetLastError
GetStringTypeW
CompareStringA
GetCPInfo
CreateFileA
GetTimeZoneInformation
GetConsoleOutputCP
GetConsoleMode
SetUnhandledExceptionFilter
InterlockedDecrement
HeapReAlloc
GetCommandLineA
HeapDestroy
TlsSetValue
CloseHandle
VirtualFree
GetACP
InterlockedExchange
SetHandleCount
SetStdHandle
VirtualAlloc
CompareStringW
SetFilePointer
GetModuleHandleA
GetStdHandle
UnhandledExceptionFilter
HeapFree
GetCurrentProcessId
ReadFile
GetProcessHeap
ExitProcess
FlushFileBuffers
GetModuleHandleW
TlsAlloc
HeapCreate
DeleteCriticalSection
CreateMutexW
GetEnvironmentStrings
GetCommandLineW
user32
PtInRect
InflateRect
GetTopWindow
GetFocus
CloseClipboard
SetFocus
GetMessageW
IsChild
MessageBoxW
CreateWindowExW
ShowWindow
CheckDlgButton
GetWindow
DrawFocusRect
DrawFrameControl
LoadMenuW
RegisterClassExW
CheckMenuItem
BringWindowToTop
DefWindowProcW
GetMenuStringW
GetCursorPos
UnpackDDElParam
CreateDialogIndirectParamW
GetDlgItem
IsWindow
MoveWindow
MapVirtualKeyW
LoadStringW
MapWindowPoints
GetWindowTextW
GetKeyNameTextW
GetMenuItemCount
LoadIconW
IsIconic
GetWindowRect
SetDlgItemInt
DestroyWindow
GetClassLongW
MessageBeep
SetTimer
DestroyIcon
GetKeyState
DispatchMessageW
SetWindowTextW
InvalidateRect
DeleteMenu
RegisterClassW
CallNextHookEx
ReleaseCapture
SetForegroundWindow
GetDC
GetForegroundWindow
CopyRect
ScrollWindowEx
DrawStateW
GetSysColorBrush
GetClipboardData
SetMenuItemInfoW
OffsetRect
DrawTextW
GetKeyboardLayout
MapDialogRect
GetParent
LoadImageW
SendMessageTimeoutW
GetWindowThreadProcessId
shell32
DragFinish
ord155
SHGetSpecialFolderLocation
DragAcceptFiles
DragQueryFileA
SHGetDesktopFolder
SHBrowseForFolderA
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ