Static task
static1
Behavioral task
behavioral1
Sample
d0eddc97e71732c69b3c3c9187b702ea419f0eabd93a457a5382f9b0c92ee205.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0eddc97e71732c69b3c3c9187b702ea419f0eabd93a457a5382f9b0c92ee205.exe
Resource
win10v2004-20221111-en
General
-
Target
d0eddc97e71732c69b3c3c9187b702ea419f0eabd93a457a5382f9b0c92ee205
-
Size
2.8MB
-
MD5
e19586a74ae8828f511e9b803599a0c6
-
SHA1
4c47fb15ad8af1aa786d1f1c3d72a5a93d46fea2
-
SHA256
d0eddc97e71732c69b3c3c9187b702ea419f0eabd93a457a5382f9b0c92ee205
-
SHA512
fadb1ee0c768796f4f4470ee8c195d6a1db8ea469ea45a67485892938effa2443d6a7c7e7b70cb2f519b238f89d64239eda2327555a85d4123976dcac97dfc3f
-
SSDEEP
49152:OlG4N/lzZB9FLyAYYHyrDZ3logLFY+3ILIJQSKPGCd2IgSTWJo58kSNUaZsf8ktG:OlG4NRZB+AHHyrDZVogLFPI0qS8JHV45
Malware Config
Signatures
Files
-
d0eddc97e71732c69b3c3c9187b702ea419f0eabd93a457a5382f9b0c92ee205.exe windows x86
a8889e5b8ff4bb3efd2228376c501b66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLongPathNameA
GetLogicalDriveStringsA
MultiByteToWideChar
SetCurrentDirectoryA
SetFilePointer
GetFileType
DuplicateHandle
GetCurrentProcess
CreateFileA
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
DosDateTimeToFileTime
SetFileTime
WriteFile
GetTempPathA
GetDiskFreeSpaceA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLastError
CreateProcessA
WaitForSingleObject
CloseHandle
WritePrivateProfileStringA
DeleteFileA
SetFileAttributesA
CopyFileA
GetShortPathNameA
WinExec
CreateDirectoryA
lstrlenA
GetModuleFileNameA
GetWindowsDirectoryA
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetHandleCount
GetSystemDirectoryA
SetEndOfFile
VirtualAlloc
VirtualFree
HeapCreate
ExitProcess
TerminateProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
user32
DialogBoxParamA
CallWindowProcA
EndPaint
KillTimer
EnableWindow
SetTimer
SetWindowTextA
ShowWindow
BeginPaint
GetClientRect
GetDlgCtrlID
SetDlgItemTextA
GetDlgItemTextA
EndDialog
MessageBoxA
FillRect
InvalidateRgn
GetFocus
DrawFocusRect
GetDlgItem
GetDC
SendMessageA
GetSystemMetrics
SetWindowPos
SetWindowLongA
ReleaseDC
LoadCursorA
SetCursor
gdi32
SetBkMode
CreateFontA
TextOutA
SetTextColor
SetBkColor
ExtTextOutA
GetObjectA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
CreateSolidBrush
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
shell32
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
comctl32
ord17
shlwapi
PathFileExistsA
SHDeleteKeyA
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ