Static task
static1
Behavioral task
behavioral1
Sample
ea8a8351b537a6fafa2005d88e130842a1b98ffc880357d4755c51f51b079d05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea8a8351b537a6fafa2005d88e130842a1b98ffc880357d4755c51f51b079d05.exe
Resource
win10v2004-20221111-en
General
-
Target
ea8a8351b537a6fafa2005d88e130842a1b98ffc880357d4755c51f51b079d05
-
Size
303KB
-
MD5
e5dd5339c0f5b8f4c788a721d2360213
-
SHA1
5232fb6b7345eda02ec8104a053c2196d4be4360
-
SHA256
ea8a8351b537a6fafa2005d88e130842a1b98ffc880357d4755c51f51b079d05
-
SHA512
23dee8715883cf2bf10b83e616cfb4e369d706265fbaa553d7fb3aa8ec6abb471e9669c934ee5833a7f7e4715990c861537976c4b9983615eed2ed8d17b30962
-
SSDEEP
6144:8eJ5Mzo40zpKNP0vDc6Hmdg8J3wT66vlmXqF31xWYYeJaAeAbkZwTagAq3l0+wmo:8eJ5Mc40UBmFFnaoQZwTaFOGz
Malware Config
Signatures
Files
-
ea8a8351b537a6fafa2005d88e130842a1b98ffc880357d4755c51f51b079d05.exe windows x86
ecf955a0396a066bc05ba0ac85e04794
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControls
kernel32
AllocConsole
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
SearchPathA
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_stricmp
_wcslwr
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_itoa
_mkdir
_pctype
_putenv
_rmdir
_setmode
_strupr
_tempnam
abort
atexit
atoi
ctime
difftime
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwprintf
fwrite
getc
getenv
malloc
memchr
memcpy
memmove
memset
mktime
printf
rand
remove
signal
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
strtol
strtoul
swprintf
time
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
user32
DispatchMessageA
EnumWindows
ExitWindowsEx
FindWindowA
GetLastActivePopup
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxW
SetForegroundWindow
ShowWindow
TranslateMessage
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE