Static task
static1
Behavioral task
behavioral1
Sample
eb81956251a4a3045ea88fb4edf0c3d1ec76484802f89db93bccea46b9e7f59e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb81956251a4a3045ea88fb4edf0c3d1ec76484802f89db93bccea46b9e7f59e.exe
Resource
win10v2004-20221111-en
General
-
Target
eb81956251a4a3045ea88fb4edf0c3d1ec76484802f89db93bccea46b9e7f59e
-
Size
269KB
-
MD5
0f179361e2e91748381e2ca33906ddd0
-
SHA1
b790d87ac8f0743b3955d0ef8b607659965345c6
-
SHA256
eb81956251a4a3045ea88fb4edf0c3d1ec76484802f89db93bccea46b9e7f59e
-
SHA512
b58e9e44d9053f984db98e91ead3bab57b301f3d053eb20c2db19c1655cd046c54ae971a73e42024ec01a2de5b82da8bd002f5a90ec72dc272ca0ea34c695061
-
SSDEEP
6144:3fSlr9KAeDo8uamHXS10NBwG2PQbwRxwuifSuz:3fcU0x3kwBwrQbwP4ay
Malware Config
Signatures
Files
-
eb81956251a4a3045ea88fb4edf0c3d1ec76484802f89db93bccea46b9e7f59e.exe windows x86
31f058f2e1d52719ea451c11827934a3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleA
ExitProcess
GetModuleFileNameA
TlsAlloc
Sleep
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSection
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateMutexW
GetProcAddress
imagehlp
FindFileInPath
SymSetContext
SymGetLinePrev64
GetTimestampForLoadedLibrary
SymSetOptions
SymGetOptions
SymMatchFileName
FindDebugInfoFile
SymGetSymNext64
RemovePrivateCvSymbolic
SymLoadModule64
ImageGetDigestStream
ImageUnload
SymUnloadModule
MapFileAndCheckSumW
ImageLoad
SymGetModuleInfo
SymGetLineNext64
SymGetSymFromAddr64
SymEnumerateSymbolsW
RemovePrivateCvSymbolicEx
SymEnumTypes
ddrawex
DllUnregisterServer
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 1KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aadpNr Size: 3KB - Virtual size: 538KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.PnT Size: 3KB - Virtual size: 560KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.OFeL Size: 2KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 93KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cDHoI Size: 2KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 123KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BsCK Size: 1024B - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ