Static task
static1
Behavioral task
behavioral1
Sample
eab6fa83894b35e9539836f64e9420ab8695c2d10946b8408813616ca19c3c81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eab6fa83894b35e9539836f64e9420ab8695c2d10946b8408813616ca19c3c81.exe
Resource
win10v2004-20220812-en
General
-
Target
eab6fa83894b35e9539836f64e9420ab8695c2d10946b8408813616ca19c3c81
-
Size
172KB
-
MD5
5cdfb51322424e824a0dd17f05fe1512
-
SHA1
cc8668e719a142c3cc1136a9ff25610a8aa77b57
-
SHA256
eab6fa83894b35e9539836f64e9420ab8695c2d10946b8408813616ca19c3c81
-
SHA512
eb3d369442c3c547fa59ddd16d83e1a3469bd15298036c3f40bb490b6c59214ac63b9c2cba6c48d6c63c23290e39c71e0d7987f0c4aeae45f7375dd5d87d29fd
-
SSDEEP
3072:/UQkM4sPdZFr40X9Az1Wujgfqb+wrzOjCRtwPuIZhjj:nFprI04yqdrzUCRWJj
Malware Config
Signatures
Files
-
eab6fa83894b35e9539836f64e9420ab8695c2d10946b8408813616ca19c3c81.exe windows x86
4628b3174667685b97d1d7037807db55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePen
SelectObject
SetTextColor
RectVisible
DeleteObject
SaveDC
GetTextMetricsA
CreateCompatibleDC
DeleteDC
GetClipBox
RestoreDC
GetStockObject
SelectPalette
CreateSolidBrush
GetPixel
PatBlt
SetStretchBltMode
SetTextAlign
GetDeviceCaps
CreateFontIndirectA
GetObjectA
SetMapMode
LineTo
CreatePalette
kernel32
GetStartupInfoA
GetUserDefaultLangID
GetProcessHeap
GetCommandLineA
QueryPerformanceCounter
GlobalFindAtomA
GetACP
lstrcmpA
GetCurrentProcess
DeleteFileW
GetWindowsDirectoryA
RemoveDirectoryA
lstrcmpiW
lstrcmpiA
GetCurrentThreadId
GetTickCount
SetCurrentDirectoryA
GetCurrentThread
IsDebuggerPresent
lstrlenW
GetConsoleOutputCP
lstrlenA
GetModuleHandleA
GetCurrentProcessId
GetCommandLineW
GetVersion
GetThreadLocale
GetOEMCP
MulDiv
DeleteFileA
CopyFileA
GlobalFindAtomW
GetDriveTypeA
GetModuleHandleW
VirtualAlloc
VirtualFree
user32
TranslateMessage
GetSystemMetrics
GetParent
GetDC
GetDesktopWindow
CharNextA
glu32
gluNurbsCallback
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Uusbb Bd Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Yuqeivss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE