Static task
static1
Behavioral task
behavioral1
Sample
eb32d632f2fe67d698d198c360c66f1601638cf398220d616de8b67d7fc3ef13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb32d632f2fe67d698d198c360c66f1601638cf398220d616de8b67d7fc3ef13.exe
Resource
win10v2004-20221111-en
General
-
Target
eb32d632f2fe67d698d198c360c66f1601638cf398220d616de8b67d7fc3ef13
-
Size
444KB
-
MD5
b34c52e43f3218712baf25f91f446b54
-
SHA1
d6174ab125c876461f7a7eb404a87c4cf8a5a97b
-
SHA256
eb32d632f2fe67d698d198c360c66f1601638cf398220d616de8b67d7fc3ef13
-
SHA512
9084eb4b817e6c750b770f0797e5f8d3d0b684d8b9989a6ff1c36b2634490a5e432721fb3fd2a17f7fa4037a336a19dd37fa9835faaa9ac42b8ee98d4ed7860d
-
SSDEEP
6144:JxEyfNKrWh+FM3PngVz3/nQ5F40tfjV8Pyjfa7hVf73BKMECjqRdfp:DEkthsM3W3sF40tfjoybm334yjG5p
Malware Config
Signatures
Files
-
eb32d632f2fe67d698d198c360c66f1601638cf398220d616de8b67d7fc3ef13.exe windows x86
3ca80eb92c6830acd124159acb671f6a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GlobalFlags
GetModuleFileNameW
InterlockedDecrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
IsDebuggerPresent
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualQuery
GetTimeFormatA
GetDateFormatA
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalAlloc
GlobalUnlock
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
OpenMutexA
CreateMutexA
GetUserDefaultLangID
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
TerminateProcess
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
Sleep
GetDriveTypeA
FormatMessageA
LocalFree
SetLastError
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetTempPathA
GetLocaleInfoA
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
CloseHandle
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
InterlockedExchange
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
GetCurrentDirectoryA
GetCurrentProcess
LoadLibraryA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
GetLastError
GetModuleHandleA
GetModuleFileNameA
GetCommandLineA
GetProcAddress
FreeLibrary
lstrlenA
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameA
GetFileAttributesA
MultiByteToWideChar
RaiseException
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnhookWindowsHookEx
GetWindow
GetDlgCtrlID
GetClassNameA
PtInRect
GetWindowTextA
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSysColor
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
WaitForInputIdle
MsgWaitForMultipleObjects
PostQuitMessage
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
MessageBoxA
IsWindow
GetClassInfoExA
GetWindowLongA
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
GetWindowRect
gdi32
DeleteDC
GetStockObject
DeleteObject
GetClipBox
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegEnumKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CLSIDFromProgID
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ