Static task
static1
Behavioral task
behavioral1
Sample
ea301e04902d5c92d2aea0c29b7e18be678c719f0335bea750e6b8c467332a99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea301e04902d5c92d2aea0c29b7e18be678c719f0335bea750e6b8c467332a99.exe
Resource
win10v2004-20220812-en
General
-
Target
ea301e04902d5c92d2aea0c29b7e18be678c719f0335bea750e6b8c467332a99
-
Size
1.7MB
-
MD5
aa20d0060b1093c62c55c1e50e23ccb5
-
SHA1
adb082847755074650c27ea9a935d4f5be73a75c
-
SHA256
ea301e04902d5c92d2aea0c29b7e18be678c719f0335bea750e6b8c467332a99
-
SHA512
a639fad5136a53275940a7df61f608ee949ee41278f4449660eb82ba2154c958dd68e83568f736fea47941907b9792211dce921906c7a52f336aecb51383c12f
-
SSDEEP
24576:fObd8wG+aPP1gFNecuXFN6Fqw3HJMLTHrn8cdns:GGO3qw3Hd
Malware Config
Signatures
Files
-
ea301e04902d5c92d2aea0c29b7e18be678c719f0335bea750e6b8c467332a99.exe windows x86
56609a6de177b0d81d9ec12d0add3544
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushConsoleInputBuffer
SetFileAttributesA
GetEnvironmentVariableW
CreateHardLinkA
FindResourceA
SetComputerNameExA
GetPrivateProfileIntW
ExpandEnvironmentStringsW
FindResourceW
GetProcessIoCounters
FileTimeToDosDateTime
DefineDosDeviceW
CompareStringW
SetSystemTimeAdjustment
SuspendThread
SetThreadContext
MultiByteToWideChar
GetComputerNameW
OpenEventA
AssignProcessToJobObject
CreateJobObjectW
LCMapStringA
SetConsoleCP
TlsSetValue
AreFileApisANSI
GetPrivateProfileIntA
GetStartupInfoA
LocalFileTimeToFileTime
SetConsoleActiveScreenBuffer
Toolhelp32ReadProcessMemory
EnumCalendarInfoW
CreateFileMappingA
GetCPInfoExW
GetFileAttributesW
CreateProcessW
OpenEventW
FoldStringW
GetLogicalDriveStringsA
IsValidCodePage
GetFileType
CreateFileW
GetACP
CreateEventA
SetEnvironmentVariableW
HeapCreate
SetEnvironmentVariableA
FlushInstructionCache
GetNamedPipeInfo
WaitForMultipleObjects
MapViewOfFile
OpenSemaphoreA
SetThreadPriorityBoost
GetProcAddress
CreateTapePartition
HeapSetInformation
SetThreadExecutionState
GetConsoleMode
GetVolumeNameForVolumeMountPointA
IsBadCodePtr
CreateMailslotW
GetExitCodeThread
CreateMutexA
FormatMessageW
SetFilePointerEx
GetLocaleInfoA
GetTimeFormatW
IsProcessorFeaturePresent
IsSystemResumeAutomatic
GetProcessPriorityBoost
GetFileTime
GetFileAttributesExA
RemoveDirectoryA
GetConsoleAliasW
ReadFile
GetCurrentConsoleFont
GetEnvironmentStrings
GetConsoleAliasesA
FindAtomA
GetVolumePathNameW
Module32FirstW
GetCompressedFileSizeA
LCMapStringW
GetCurrencyFormatW
HeapSize
DeviceIoControl
ReadProcessMemory
GetComputerNameA
VirtualQuery
DuplicateHandle
FlushFileBuffers
GetFileAttributesA
CopyFileW
GetConsoleAliasA
CompareFileTime
SetFileTime
GetDateFormatW
GetFullPathNameA
GetPrivateProfileSectionW
CopyFileExA
GetConsoleScreenBufferInfo
Module32Next
ExpandEnvironmentStringsA
FormatMessageA
SetLocaleInfoA
FoldStringA
GetTapeStatus
VerSetConditionMask
GetTempPathW
GetBinaryTypeA
EraseTape
GetUserDefaultLangID
SetComputerNameExW
SetThreadPriority
CreateDirectoryW
lstrcpynA
GetSystemTime
CreateNamedPipeW
SetUnhandledExceptionFilter
GetStringTypeA
GetFileInformationByHandle
OpenWaitableTimerW
CreateSemaphoreA
GetProcessWorkingSetSize
SetEndOfFile
GetNumberOfConsoleInputEvents
SetThreadIdealProcessor
GetShortPathNameW
CreateHardLinkW
ReplaceFileW
FindResourceExW
VirtualAlloc
SetStdHandle
IsDBCSLeadByteEx
GetThreadLocale
GetProcessTimes
GetSystemWindowsDirectoryA
ProcessIdToSessionId
SetPriorityClass
SetTapePosition
GetUserDefaultLCID
user32
DrawFocusRect
LoadIconW
SetClassLongW
wsprintfW
OpenWindowStationW
BeginPaint
MessageBoxW
AttachThreadInput
SendMessageW
LoadStringA
WaitMessage
GetCapture
InvalidateRect
GetClassNameA
GetClientRect
GetSystemMetrics
OpenInputDesktop
MonitorFromRect
AdjustWindowRect
CheckMenuItem
EnableWindow
SetWindowsHookExA
DialogBoxParamA
GetDlgCtrlID
LoadMenuW
CopyIcon
RegisterClassExW
SetWindowTextA
SetDlgItemInt
UnionRect
GetCursor
TrackPopupMenuEx
MapDialogRect
ShowScrollBar
LoadIconA
PostThreadMessageA
SendNotifyMessageW
ScreenToClient
wsprintfA
NotifyWinEvent
FrameRect
RegisterClassA
ChildWindowFromPoint
RegisterClassW
ExitWindowsEx
SetScrollPos
OpenDesktopW
GetDlgItemTextA
IsClipboardFormatAvailable
CallWindowProcW
GetAltTabInfoA
shell32
SHChangeNotify
SHGetSpecialFolderLocation
ShellExecuteExW
CommandLineToArgvW
ShellExecuteW
SHGetDesktopFolder
SHFileOperationW
SHBrowseForFolderW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHGetFileInfoW
SHBindToParent
SHGetMalloc
Sections
.text Size: 804KB - Virtual size: 803KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.07ia Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00hm9 Size: 493KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ