Static task
static1
Behavioral task
behavioral1
Sample
ea0c83321c19ed16c8ff0ba1e395647c3a8363aa71ce1f714cf3a4d0bde11e55.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ea0c83321c19ed16c8ff0ba1e395647c3a8363aa71ce1f714cf3a4d0bde11e55.exe
Resource
win10v2004-20221111-en
General
-
Target
ea0c83321c19ed16c8ff0ba1e395647c3a8363aa71ce1f714cf3a4d0bde11e55
-
Size
448KB
-
MD5
dd8f3e180bc018347c5362381c4d9eeb
-
SHA1
4cb9ad4064b834d8e8292b9be69c63d212b8ce99
-
SHA256
ea0c83321c19ed16c8ff0ba1e395647c3a8363aa71ce1f714cf3a4d0bde11e55
-
SHA512
b4e03e1a64ca0a3e2526d1a0690952629048183bb7d74184ee8fae7f803731bc18314825d43092376627f67bb916f60fdfbbceb5a4f7c0a6c4b60ee7aa4825e3
-
SSDEEP
12288:TJ0dpQSS7miAl2V/ge6+0WTQZ47FC7Up+I0t2qbTIe:TJ0dpQSxiw2V/R6+0bZGCuy2qx
Malware Config
Signatures
Files
-
ea0c83321c19ed16c8ff0ba1e395647c3a8363aa71ce1f714cf3a4d0bde11e55.exe windows x86
0e4551749624d4f8b76de90520fbe314
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_itoa
memset
_chkstk
memcpy
msvcrt
rand
??3@YAXPAX@Z
kernel32
CreateProcessA
GetWindowsDirectoryA
lstrlenA
WriteFile
GetTempPathA
DeleteFileA
InterlockedIncrement
ExitProcess
GetVolumeInformationA
DeleteCriticalSection
HeapAlloc
HeapCreate
CloseHandle
GetVersionExA
GetTickCount
GetTempFileNameA
CopyFileA
CreateFileA
Sleep
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
HeapFree
GetModuleFileNameA
GetLastError
WaitForSingleObject
LocalFree
LocalAlloc
GetCurrentProcess
user32
DispatchMessageA
TranslateMessage
GetForegroundWindow
GetDesktopWindow
GetMessageA
LoadIconA
IsWindow
advapi32
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegFlushKey
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
gdiplus
GdiplusStartup
GdiplusShutdown
Sections
.text Size: 436KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ