Static task
static1
Behavioral task
behavioral1
Sample
ed7ecda40e919ad0b556f8a1b3b7c13088edadcade0361d112f5d9c4f6583389.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed7ecda40e919ad0b556f8a1b3b7c13088edadcade0361d112f5d9c4f6583389.exe
Resource
win10v2004-20220812-en
General
-
Target
ed7ecda40e919ad0b556f8a1b3b7c13088edadcade0361d112f5d9c4f6583389
-
Size
176KB
-
MD5
f628ce31bbaa57afb110057e4c6bbd68
-
SHA1
41213e15641648b6e1b49dc6c95a0015a7a656cb
-
SHA256
ed7ecda40e919ad0b556f8a1b3b7c13088edadcade0361d112f5d9c4f6583389
-
SHA512
4a05565b2770d0db2c2419903891d94caf740ca2b8cbfa05e03cc403036b87a7aa7eab551c9d950c5e140e30104b3deada9d87fbd2227946f05f5e6f8a7e0949
-
SSDEEP
3072:cfRAJ53a6vaQvwoS3CZIPcRd861nscnJHDYt5oNB5BE:cf853a6vaQvwoSSZ3d86h5nWINB5BE
Malware Config
Signatures
Files
-
ed7ecda40e919ad0b556f8a1b3b7c13088edadcade0361d112f5d9c4f6583389.exe windows x86
c0e76e26d8a8eca5fe31704a152af75f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
SetLastError
GetProcAddress
LoadLibraryA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CloseHandle
GetCurrentProcessId
DebugBreak
ExitProcess
CreateFileA
GetFileSize
FindResourceA
FreeResource
LoadResource
GetWindowsDirectoryA
GlobalAlloc
SizeofResource
ReadFile
SetFileAttributesA
GlobalFree
Sleep
GetModuleHandleA
VirtualProtect
GetSystemTime
DeleteFileA
CreateThread
SetEndOfFile
CreateFileW
InitializeCriticalSection
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
GetCurrentThread
GetTickCount
OutputDebugStringW
LockResource
Process32First
LCMapStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
SetFilePointer
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
WriteConsoleA
GetProcessHeap
user32
LoadCursorA
OpenClipboard
DispatchMessageA
ShowWindow
SetWindowsHookExA
DefWindowProcA
GetMessageA
RegisterClassExA
GetKeyState
IsClipboardFormatAvailable
CallNextHookEx
TranslateMessage
GetForegroundWindow
GetWindowTextA
GetClipboardData
CreateWindowExA
advapi32
RegOpenKeyExA
RegSetValueExA
GetUserNameA
RegCloseKey
ws2_32
gethostbyname
wininet
InternetCloseHandle
InternetConnectA
FtpPutFileA
InternetOpenA
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ