Static task
static1
Behavioral task
behavioral1
Sample
ebecb90e019af18238f9449c6c4021ba06f3439d66415b0568d38c63b6ef36a8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebecb90e019af18238f9449c6c4021ba06f3439d66415b0568d38c63b6ef36a8.exe
Resource
win10v2004-20221111-en
General
-
Target
ebecb90e019af18238f9449c6c4021ba06f3439d66415b0568d38c63b6ef36a8
-
Size
174KB
-
MD5
d948cc9d2a041b95fa2e3b3cc3ff09d1
-
SHA1
a4215d729753ddc6b2451960b50ccd74ce2e2ed5
-
SHA256
ebecb90e019af18238f9449c6c4021ba06f3439d66415b0568d38c63b6ef36a8
-
SHA512
aad067b0cbb7581aa5357f0572a6812b18562ee260017a3c1b68dc76cc77e91ffc01b8200076c6ab1fd793b20789b01ef6374753551cb3a8fbe67efe0025b54b
-
SSDEEP
3072:80h0Cig3BxL4fAsZKIsfcJ+pJ9daiihTy5SRA5HnDPmBKLhyBeVkGYhTNoRM:vh0mT4BVsUGJ98wD5HvhyjbCK
Malware Config
Signatures
Files
-
ebecb90e019af18238f9449c6c4021ba06f3439d66415b0568d38c63b6ef36a8.exe windows x86
6ae44b68bfb42c69f1e0e8b577a22c81
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
GetLastError
GetLocaleInfoA
CreateNamedPipeW
DeleteFileA
AreFileApisANSI
DeleteFileW
MoveFileA
MoveFileW
GetTempFileNameA
GetTempPathA
GetTempFileNameW
GetTempPathW
CreateFileA
CreateFileW
CloseHandle
SetFilePointer
ReadFile
WriteFile
GetStringTypeW
LoadLibraryA
FreeLibrary
GetProcAddress
GlobalFree
GetVersion
GlobalAlloc
ExitProcess
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetDriveTypeW
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
InterlockedExchange
VirtualQuery
HeapFree
SetUnhandledExceptionFilter
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
MultiByteToWideChar
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameW
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetCurrentDirectoryW
SetStdHandle
FlushFileBuffers
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
WideCharToMultiByte
FindFirstFileA
FindFirstFileW
FindClose
GetModuleHandleA
GetFileAttributesW
user32
CharToOemA
OemToCharBuffA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetAce
InitializeAcl
GetSecurityInfo
AddAce
oleaut32
SysReAllocStringLen
SafeArraySetRecordInfo
VarTokenizeFormatString
GetErrorInfo
Sections
.text Size: 84KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 330B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ