Static task
static1
Behavioral task
behavioral1
Sample
eb1bf0f2cd16fd2b1f17c80b796c699bc2f352d7a378a7916cb853e1d6ec6e68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eb1bf0f2cd16fd2b1f17c80b796c699bc2f352d7a378a7916cb853e1d6ec6e68.exe
Resource
win10v2004-20220812-en
General
-
Target
eb1bf0f2cd16fd2b1f17c80b796c699bc2f352d7a378a7916cb853e1d6ec6e68
-
Size
295KB
-
MD5
141c614945638bef80bf5ae63d7390b9
-
SHA1
de3296637acf1783f570f8264f9b227984207e2b
-
SHA256
eb1bf0f2cd16fd2b1f17c80b796c699bc2f352d7a378a7916cb853e1d6ec6e68
-
SHA512
06b9022c14fe9ad9b41b591a1677264a6f3957168a5e999d1c215bded46debcb3ea6fe6aa8edbaf5d0a1b72eb9e8c191af40251fca23084f341c089e54f83bb8
-
SSDEEP
6144:29Ncj86i7QaMyUtZahwg5dmgFDMH5hhZOxHg7SbOr16p+Baemv+:zh7tZkwgy9ZhbOZCSbOgPv
Malware Config
Signatures
Files
-
eb1bf0f2cd16fd2b1f17c80b796c699bc2f352d7a378a7916cb853e1d6ec6e68.exe windows x86
40384d367edeb90e29e67413f56c5609
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
FindWindowExA
FindWindowExW
GetSystemMetrics
ExitWindowsEx
CharPrevA
MessageBoxA
SendMessageA
PostMessageA
CharUpperA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
advapi32
RegCloseKey
SetSecurityDescriptorDacl
RevertToSelf
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
SetTokenInformation
RegQueryValueExW
RegOpenKeyExA
ImpersonateSelf
RegOpenKeyExW
GetUserNameA
RegDeleteValueA
GetTokenInformation
RegSetValueExA
RegQueryInfoKeyA
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RegEnumKeyExA
LookupPrivilegeValueA
DuplicateTokenEx
oleaut32
SysFreeString
SysAllocStringByteLen
kernel32
GetProcessHeap
HeapAlloc
GetCurrentDirectoryA
WaitForSingleObject
GetShortPathNameA
HeapFree
ProcessIdToSessionId
lstrlenA
FormatMessageA
GetLocalTime
GetDateFormatA
SetLastError
LocalFree
FreeLibrary
EnterCriticalSection
WritePrivateProfileStringA
DeleteCriticalSection
lstrcpynA
GetCurrentThreadId
LeaveCriticalSection
LoadLibraryExA
GetWindowsDirectoryA
CopyFileA
DeleteFileA
MoveFileExA
lstrcmpiA
GetModuleHandleA
GetTempFileNameA
GetPrivateProfileStringA
CloseHandle
ReleaseMutex
GetACP
GetCommandLineW
GetComputerNameA
OpenProcess
GetCommandLineA
WideCharToMultiByte
CreateEventA
CreateProcessA
CreateMutexA
IsValidCodePage
VirtualAlloc
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathFileExistsA
PathRemoveFileSpecA
iphlpapi
GetTcpTable
GetUdpTable
GetIcmpStatistics
InternalGetIpAddrTable
UnenableRouter
InternalDeleteIpForwardEntry
GetIpStatistics
NhGetInterfaceNameFromGuid
DeleteIpNetEntry
GetIpAddrTable
rnr20
NSPStartup
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 443KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ