?JHFjhkfjlKLUJFiufiOUuifHLFJHlffgdgf@@YGKEPA_WG@Z
Static task
static1
Behavioral task
behavioral1
Sample
eaabe69b2497d7f58c8777d73a820fcfa048aac0a8635afd7ae5c20a2ddee7be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eaabe69b2497d7f58c8777d73a820fcfa048aac0a8635afd7ae5c20a2ddee7be.exe
Resource
win10v2004-20220812-en
General
-
Target
eaabe69b2497d7f58c8777d73a820fcfa048aac0a8635afd7ae5c20a2ddee7be
-
Size
255KB
-
MD5
f146217e2e4672b7b4457d157c515610
-
SHA1
716d91f6fed052eaaffb9f9a8b64011a10d6baf9
-
SHA256
eaabe69b2497d7f58c8777d73a820fcfa048aac0a8635afd7ae5c20a2ddee7be
-
SHA512
054594ef6ba312efef6fc71f927d049f2fc4a8d394988260880658c27d79af4d00a5004e4124990d983a389e917e0a31079e7710a3550fe424bc2ba8519ec685
-
SSDEEP
6144:chW9S0TzsWuXT0FKWWfisbJTkZHY8kkeyJ/6RmfX:chp0TzaDrfiFZkQJV
Malware Config
Signatures
Files
-
eaabe69b2497d7f58c8777d73a820fcfa048aac0a8635afd7ae5c20a2ddee7be.exe windows x86
8e3095e9ee8d925577d588261e9f83f8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateICW
UnrealizeObject
GetObjectW
PtVisible
EndDoc
GetCurrentPositionEx
CreateDIBitmap
DeleteDC
RealizePalette
DeleteObject
CreateCompatibleBitmap
GetTextCharsetInfo
SetBkColor
GetDeviceCaps
CreateFontIndirectW
CreateDCW
CreatePen
CreateSolidBrush
user32
ShowScrollBar
GetMenuItemID
LoadMenuW
IsRectEmpty
InflateRect
GetDC
GetClientRect
DestroyCaret
WindowFromPoint
DispatchMessageA
GetWindowPlacement
GetWindowDC
LoadCursorA
ShowOwnedPopups
GetIconInfo
GetSystemMetrics
IsDlgButtonChecked
ShowWindow
CharUpperBuffW
SetMenuItemInfoW
OemToCharBuffA
CharNextA
ShowCursor
DefDlgProcW
DrawStateW
DrawEdge
GetSysColorBrush
AdjustWindowRectEx
ChildWindowFromPoint
SetForegroundWindow
GetWindow
LoadIconA
OpenInputDesktop
GetTopWindow
MapWindowPoints
GetMenuItemCount
EnableScrollBar
LookupIconIdFromDirectory
ntdll
memset
kernel32
GetFileAttributesExA
IsValidLocale
SetFileTime
CopyFileA
GetTimeFormatA
CreateNamedPipeA
FoldStringW
TransactNamedPipe
CreateWaitableTimerW
GetLocaleInfoW
SetHandleInformation
SetThreadLocale
AddAtomA
lstrcmpiA
GetFileAttributesA
GlobalMemoryStatus
DeleteFileW
GetVersionExA
Exports
Exports
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nfodat Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.temp Size: 1024B - Virtual size: 661B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.port Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ