Static task
static1
Behavioral task
behavioral1
Sample
ea4c21b6386e185f3f9e2576cd982ba0fb5b180327634c025227702cc53f6fe9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea4c21b6386e185f3f9e2576cd982ba0fb5b180327634c025227702cc53f6fe9.exe
Resource
win10v2004-20220812-en
General
-
Target
ea4c21b6386e185f3f9e2576cd982ba0fb5b180327634c025227702cc53f6fe9
-
Size
241KB
-
MD5
bdc514cd2a1934725ffe9eb1c1fb30cb
-
SHA1
1542fe709c391fe4abfb9739611ccb2399cc9885
-
SHA256
ea4c21b6386e185f3f9e2576cd982ba0fb5b180327634c025227702cc53f6fe9
-
SHA512
1ad21319c34640ec22b66e458f1c90e439fce769e909c55564fb5bb59e00bb487f0a566a054bd9d84f699e349ef32cf7b3ef2f3366c665e6b538b4c00b4be638
-
SSDEEP
3072:X7PBbB4HfmhZOGjzmTfwQaIvDL3UZ50beEPDELg:X75BgfmhQ+SnL3k5WDE
Malware Config
Signatures
Files
-
ea4c21b6386e185f3f9e2576cd982ba0fb5b180327634c025227702cc53f6fe9.exe windows x86
9058607b4021ef3ec141cd81a8ba5f19
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
GlobalFlags
GetThreadTimes
WriteConsoleInputW
FindNextFileW
Thread32Next
ReadConsoleA
Process32First
AddAtomW
Heap32ListFirst
GetBinaryTypeA
WritePrivateProfileSectionW
GetCommMask
ExpandEnvironmentStringsA
SetLocaleInfoW
EscapeCommFunction
EnumTimeFormatsW
CallNamedPipeW
SetConsoleActiveScreenBuffer
GetCommTimeouts
FindCloseChangeNotification
GetBinaryTypeA
SetThreadExecutionState
GetPrivateProfileSectionA
SetNamedPipeHandleState
GetTimeFormatW
GlobalGetAtomNameA
CreateConsoleScreenBuffer
GetProcessAffinityMask
GetProcessShutdownParameters
LocalFlags
SetHandleInformation
Process32First
LocalShrink
CreateHardLinkW
IsBadWritePtr
WritePrivateProfileSectionA
ClearCommBreak
CreatePipe
user32
GetWindowRgn
CreateDialogParamA
RegisterClassExW
PostThreadMessageA
SetWindowsHookW
EnumDisplaySettingsExW
CharPrevW
SetWindowTextA
CallNextHookEx
FindWindowExW
TranslateAcceleratorA
FindWindowA
UpdateWindow
IsZoomed
FindWindowExA
SetProcessWindowStation
WINNLSEnableIME
CreateWindowExA
WINNLSGetEnableStatus
DdeCmpStringHandles
UnhookWindowsHookEx
GetTitleBarInfo
MonitorFromPoint
Sections
.text Size: 223KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.alt Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE