Static task
static1
Behavioral task
behavioral1
Sample
ebefbdc5dfefcf673b7e345e5ad8d0c1ae15d2251f296b0c28fcf20e88c80eb1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebefbdc5dfefcf673b7e345e5ad8d0c1ae15d2251f296b0c28fcf20e88c80eb1.exe
Resource
win10v2004-20221111-en
General
-
Target
ebefbdc5dfefcf673b7e345e5ad8d0c1ae15d2251f296b0c28fcf20e88c80eb1
-
Size
228KB
-
MD5
c68b7641088b85920ccda734c86ded9b
-
SHA1
93e09047921bfabc8207287cb8120c6dc70f27b4
-
SHA256
ebefbdc5dfefcf673b7e345e5ad8d0c1ae15d2251f296b0c28fcf20e88c80eb1
-
SHA512
2daeca928f3f425fada7edbe76219cd1d5cc30ff33cb21d31a4464b9a94dd0368b74336578fd3e39fa485d5a4ed9f41c1ce1e505e2a784a20b75e058c18a9f7c
-
SSDEEP
3072:UwpcMG3TSuL31c2RpLGIndl1Jctboz8RVOkrGOXbDTGcsGyJdTMtPkS8el:xIjV1c2/GKdnTILXbWc6/T1S
Malware Config
Signatures
Files
-
ebefbdc5dfefcf673b7e345e5ad8d0c1ae15d2251f296b0c28fcf20e88c80eb1.exe windows x86
1cb526c022a05d945b0a020bd0c09aa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetTimeZoneInformation
RaiseException
GetProfileStringA
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
GetTickCount
GetOEMCP
GetCPInfo
SetErrorMode
GetFileTime
GetFileAttributesA
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
FreeLibrary
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetThreadLocale
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
TerminateProcess
GetFileSize
WaitForSingleObject
FormatMessageA
lstrlenA
CreateFileA
WriteFile
MultiByteToWideChar
GetVersionExA
LoadLibraryA
GetProcAddress
LocalFree
GetVersion
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetLastError
lstrcatA
FindFirstFileA
FindClose
CreateDirectoryA
GetModuleFileNameA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
CloseHandle
ResumeThread
CreateProcessA
Sleep
GetEnvironmentStringsW
OutputDebugStringA
user32
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CharUpperA
LoadStringA
IsDialogMessageA
SetWindowPos
GetWindow
SetWindowContextHelpId
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
LoadIconA
PostMessageA
PostQuitMessage
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
BeginPaint
SetWindowTextA
MoveWindow
ShowWindow
DestroyMenu
ClientToScreen
GetDC
ReleaseDC
SetCursor
wsprintfA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
DefDlgProcA
IsWindowUnicode
SendMessageA
EndDialog
PostThreadMessageA
RegisterClipboardFormatA
InflateRect
InvalidateRect
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
GetWindowDC
PtInRect
GetClassNameA
LoadCursorA
GetDesktopWindow
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
MapDialogRect
gdi32
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
PatBlt
GetMapMode
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyA
ConvertSidToStringSidA
GetTokenInformation
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
comctl32
ord17
oledlg
ord8
ole32
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoUninitialize
OleUninitialize
CoFreeUnusedLibraries
CoCreateInstance
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
olepro32
ord253
oleaut32
SysAllocString
VariantChangeType
VariantCopy
VariantTimeToSystemTime
VariantClear
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetReadFileExA
shlwapi
PathFileExistsA
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ