Static task
static1
Behavioral task
behavioral1
Sample
eb2b05d4159627828470fc6cf06ca6a37384ba5d6bf2f36913331648a1ccb608.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eb2b05d4159627828470fc6cf06ca6a37384ba5d6bf2f36913331648a1ccb608.exe
Resource
win10v2004-20220812-en
General
-
Target
eb2b05d4159627828470fc6cf06ca6a37384ba5d6bf2f36913331648a1ccb608
-
Size
80KB
-
MD5
df29f64b5461b46d8f8b0dd0d5a784f6
-
SHA1
294ca3378b1451f31434b7b10fffe838fb109cda
-
SHA256
eb2b05d4159627828470fc6cf06ca6a37384ba5d6bf2f36913331648a1ccb608
-
SHA512
b463a8716b75f0bac64d3f5b734394b14b7368ba5e5c1343bcefa3876d9fc80e42de5e54889fa968771cbf601b7a28d313c004ad16b8bdff2ab3548abc0c1629
-
SSDEEP
1536:Fee35pevOdITCBi3TrnRPS+P4Ot6yEcUxBsQaxCQ5Q2UFZJ28l6mjWnCR:Jc2dXBkTrnRrHEcGGCYpzo6m3R
Malware Config
Signatures
Files
-
eb2b05d4159627828470fc6cf06ca6a37384ba5d6bf2f36913331648a1ccb608.exe windows x86
abfd00d646f2350219a83615f9ad1eac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowTextA
GetMessageA
GetSubMenu
SetWindowPos
EnumWindows
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
EqualRect
GetScrollPos
PostQuitMessage
EnableMenuItem
FrameRect
kernel32
GetTimeZoneInformation
VirtualAllocEx
GetOEMCP
InterlockedExchange
GetTickCount
GetCurrentProcessId
ExitProcess
FileTimeToSystemTime
GetThreadLocale
GetStartupInfoA
GetSystemTime
GetFileAttributesA
GetTempPathA
RtlUnwind
SetUnhandledExceptionFilter
gdi32
ExcludeClipRect
CopyEnhMetaFileA
SetViewportExtEx
CreateICW
GetMapMode
DPtoLP
SelectClipPath
CreateCompatibleBitmap
FillRgn
ole32
CoTaskMemRealloc
OleRun
CoCreateInstance
StgOpenStorage
CoInitialize
DoDragDrop
StringFromGUID2
CoInitializeSecurity
CoRevokeClassObject
advapi32
RegCreateKeyA
GetUserNameA
CryptHashData
QueryServiceStatus
FreeSid
CheckTokenMembership
RegCreateKeyExW
GetSecurityDescriptorDacl
RegQueryValueExW
AdjustTokenPrivileges
msvcrt
fprintf
strncpy
_flsbuf
_mbscmp
fflush
signal
puts
strlen
strcspn
iswspace
__setusermatherr
__getmainargs
_CIpow
_lock
raise
_strdup
__initenv
_fdopen
comctl32
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Destroy
CreatePropertySheetPageA
ImageList_SetIconSize
InitCommonControls
ImageList_GetBkColor
ImageList_LoadImageW
ImageList_DragEnter
ImageList_LoadImageA
ImageList_GetIcon
ImageList_Write
ImageList_ReplaceIcon
shell32
CommandLineToArgvW
SHBrowseForFolderA
ExtractIconExW
ShellExecuteW
DragQueryFileA
DragQueryFileW
ShellExecuteEx
DoEnvironmentSubstW
DragAcceptFiles
SHGetPathFromIDList
ExtractIconW
oleaut32
VariantCopy
SysReAllocStringLen
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE