Static task
static1
Behavioral task
behavioral1
Sample
1ea13a469954e816ff91e150202be23e35357f5191134111c81f624ef6b7b9de.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1ea13a469954e816ff91e150202be23e35357f5191134111c81f624ef6b7b9de.exe
Resource
win10v2004-20220901-en
General
-
Target
1ea13a469954e816ff91e150202be23e35357f5191134111c81f624ef6b7b9de
-
Size
240KB
-
MD5
0b8836d0701fcc5a47e6a3b6fac85a70
-
SHA1
555bd5f2951d3012728adbca99d47f753ff215e2
-
SHA256
1ea13a469954e816ff91e150202be23e35357f5191134111c81f624ef6b7b9de
-
SHA512
e69708b3c30c053dd86a3c92e5adafc77a4ddad0ecd0a371914aa2e0c7bb89e1566dd1a57ad16492c09f942ab684f217ed8cddcbb30e3a08c61addb6897254de
-
SSDEEP
3072:JY4pttfBW3Xjj/7eaNmkiWvivPrv4oyu96ja6di5jhH+cinUxnCAgpRmPMlZ0Tgd:JY4ppY/7evOqXVX5jI/UMAA0E0TgAP
Malware Config
Signatures
Files
-
1ea13a469954e816ff91e150202be23e35357f5191134111c81f624ef6b7b9de.exe windows x86
581f343f368565e2f080283f59ff3a94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
BeginPaint
AdjustWindowRectEx
CallNextHookEx
CallWindowProcA
CharUpperA
CheckMenuItem
ClientToScreen
CopyRect
CreateDialogIndirectParamA
CreateWindowExA
DdeEnableCallback
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
DrawIcon
DrawTextA
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
GetActiveWindow
GetCapture
GetClassInfoA
GetClassLongA
GetClassNameA
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetLastActivePopup
GetMenu
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMessageA
GetMessagePos
GetMessageTime
GetNextDlgTabItem
GetParent
GetPropA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
wsprintfA
WinHelpA
ValidateRect
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TabbedTextOutA
SystemParametersInfoA
ShowWindow
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetPropA
SetMenuItemBitmaps
SetForegroundWindow
SetFocus
SetCursor
SetActiveWindow
SendMessageA
SendDlgItemMessageA
RemovePropA
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
ModifyMenuA
MessageBoxA
MapWindowPoints
LoadStringA
LoadIconA
LoadCursorA
LoadBitmapA
IsWindowVisible
IsWindowEnabled
IsWindow
IsIconic
IsDialogMessageA
GrayStringA
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindow
GetTopWindow
advapi32
AddAccessDeniedAceEx
ElfCloseEventLog
ElfOldestRecord
GetAclInformation
LockServiceDatabase
LsaEnumeratePrivileges
LsaICLookupNamesWithCreds
MSChapSrvChangePassword
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
SystemFunction016
SystemFunction030
AddUsersToEncryptedFile
gdi32
PtInRegion
OffsetViewportOrgEx
GetStockObject
GetRelAbs
GetObjectA
GetDeviceCaps
GetDCPenColor
GetClipBox
PtVisible
ExtTextOutA
Escape
EnumEnhMetaFile
DeleteObject
DeleteDC
CreateEllipticRgn
CreateDIBitmap
CreateBitmap
RectVisible
RestoreDC
RoundRect
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SelectObject
SetBkColor
SetMapMode
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
TextOutA
GdiPlayDCScript
gdiPlaySpoolStream
kernel32
FlushInstructionCache
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
VirtualFree
VirtualAlloc
UnlockFile
UnhandledExceptionFilter
Toolhelp32ReadProcessMemory
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
Sleep
SetUnhandledExceptionFilter
SetTimeZoneInformation
SetSystemTime
SetStdHandle
SetLastError
SetHandleCount
SetFileTime
SetFilePointer
SetFileAttributesA
SetErrorMode
SetEnvironmentVariableA
SetEndOfFile
SetCurrentDirectoryA
SetConsoleTextAttribute
SetConsoleScreenBufferSize
SetConsoleCursorPosition
SetConsoleCursorInfo
RtlUnwind
ReleaseActCtx
ReadProcessMemory
ReadFile
RaiseException
MultiByteToWideChar
MulDiv
MapUserPhysicalPages
LockResource
LockFile
LocalUnlock
LocalReAlloc
LocalFree
LocalFileTimeToFileTime
LocalAlloc
LoadResource
LoadLibraryA
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidLocale
IsDebuggerPresent
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
InitializeSListHead
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalGetAtomNameA
GlobalFree
GlobalFlags
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetVersion
GetTimeZoneInformation
GetThreadLocale
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoA
GetProcessVersion
GetProcAddress
GetOEMCP
GetModuleHandleA
GetModuleFileNameA
Beep
ClearCommError
CloseHandle
CompareStringA
CompareStringW
CreateFileA
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
DuplicateHandle
EnterCriticalSection
ExitProcess
FatalExit
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ