Static task
static1
Behavioral task
behavioral1
Sample
ecb53c7164b86ccbc79074e4f7d8d951e9105d3932f120949563cabe108f8f6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecb53c7164b86ccbc79074e4f7d8d951e9105d3932f120949563cabe108f8f6e.exe
Resource
win10v2004-20220812-en
General
-
Target
ecb53c7164b86ccbc79074e4f7d8d951e9105d3932f120949563cabe108f8f6e
-
Size
243KB
-
MD5
a09417816dbb05a769972687406c442f
-
SHA1
8ca6ebe7dbe1c153f4bac0cabfbea7590104c1e0
-
SHA256
ecb53c7164b86ccbc79074e4f7d8d951e9105d3932f120949563cabe108f8f6e
-
SHA512
82adee4d8ae1997f6b77659636d1b9bfffe9a9592bd3f4e62321be4611687b615f93f6649b33f3c0fa4623485895d2be2ca49e7f6900213fee87a11120770af6
-
SSDEEP
3072:XvZ+/IoP2cTYWyzO/x/M9QunkctZyYQvPYx87TbmST6MK+harrrrrrrrHrr1rrrd:fQQoxGYyXkWQXt7Oo68xL
Malware Config
Signatures
Files
-
ecb53c7164b86ccbc79074e4f7d8d951e9105d3932f120949563cabe108f8f6e.exe windows x86
ffb383aa8747f06d2ecd84df13937b81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CreateFileA
CreateMutexA
CreateProcessW
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
VirtualAllocEx
lstrlenA
lstrcpyA
lstrcmpW
WriteFile
WideCharToMultiByte
WaitForMultipleObjects
Sleep
SetThreadLocale
SetThreadExecutionState
SetLastError
SetFilePointer
SetFileAttributesA
SetEvent
ReleaseMutex
RaiseException
OutputDebugStringW
MultiByteToWideChar
MoveFileExW
LocalFree
LocalAlloc
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
HeapReAlloc
HeapFree
HeapAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVersionExW
GetVersionExA
GetThreadLocale
CloseHandle
GetStartupInfoA
GetProcessHeap
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetCurrentThreadId
GetComputerNameW
FormatMessageW
FormatMessageA
ExitProcess
user32
LoadStringA
MessageBeep
NotifyWinEvent
OffsetRect
PeekMessageW
PostQuitMessage
PostThreadMessageW
RedrawWindow
ScrollWindowEx
SetClassLongW
SetDlgItemInt
SetForegroundWindow
SetMenu
SetProcessDefaultLayout
SetRect
SetScrollInfo
SetScrollPos
SetWindowPlacement
SetWindowsHookExW
TrackMouseEvent
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassW
UpdateLayeredWindow
WindowFromPoint
LoadIconA
GetSystemMetrics
LoadIconW
LoadAcceleratorsW
IsRectEmpty
IsMenu
IsIconic
IsDlgButtonChecked
InvalidateRgn
IntersectRect
InsertMenuW
InflateRect
GetWindowTextW
GetWindowTextLengthW
GetWindowPlacement
GetTopWindow
GetSubMenu
GetScrollInfo
GetProcessDefaultLayout
GetMessageW
GetMenuStringW
GetMenu
GetLastActivePopup
GetKeyState
GetIconInfo
GetDoubleClickTime
GetDlgItemInt
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClassNameW
GetClassLongW
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowW
EndMenu
EnableMenuItem
DrawTextW
DrawTextExW
DrawIcon
DrawFrameControl
DrawFocusRect
DragDetect
DispatchMessageW
DialogBoxParamW
DestroyIcon
DestroyCursor
DeleteMenu
CreateDialogIndirectParamW
CreateAcceleratorTableW
ClipCursor
ClientToScreen
CheckDlgButton
CharNextW
CharLowerW
CallNextHookEx
BringWindowToTop
AppendMenuW
AdjustWindowRectEx
GetWindowThreadProcessId
gdi32
CreateDCA
CombineRgn
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
CreateDIBSection
CreateFontIndirectW
CreatePatternBrush
CreatePen
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DPtoLP
DeleteDC
DeleteObject
ExcludeClipRect
ExtTextOutW
GetClipBox
GetCurrentObject
GetDIBits
GetDeviceCaps
GetLayout
GetNearestColor
GetObjectA
GetObjectW
GetStockObject
GetTextExtentPoint32W
GetTextMetricsW
LPtoDP
LineTo
MoveToEx
PatBlt
Polygon
Rectangle
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetROP2
SetRectRgn
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
StretchBlt
TextOutW
BitBlt
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
Sections
.text Size: 203KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ