Static task
static1
Behavioral task
behavioral1
Sample
ed983134c32f4eef8f66b70ca42632a333f1816a4335fd13df78b03c0ef4ad6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed983134c32f4eef8f66b70ca42632a333f1816a4335fd13df78b03c0ef4ad6b.exe
Resource
win10v2004-20220812-en
General
-
Target
ed983134c32f4eef8f66b70ca42632a333f1816a4335fd13df78b03c0ef4ad6b
-
Size
582KB
-
MD5
c755c161b2d17424c48f6814297799ca
-
SHA1
89fc502135ad8a53e72542e6f95484e0e82361f6
-
SHA256
ed983134c32f4eef8f66b70ca42632a333f1816a4335fd13df78b03c0ef4ad6b
-
SHA512
67eafaa488fe22853b0bfc70b6eb9ed586b60734744ce62e6f8635d396148c8a1e698c59c245e6c4be9c44d1a75f7e1a15e1452278fb4f147936b014a61e7c36
-
SSDEEP
12288:cEEbc4nTmBmBULEBNKWMtrElvDVjyJNR8zusUQlaQ:cEEbcVkBNCZElAJjsDL
Malware Config
Signatures
Files
-
ed983134c32f4eef8f66b70ca42632a333f1816a4335fd13df78b03c0ef4ad6b.exe windows x86
c00275a4a563a51c29f49812d4f01080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
DebugActiveProcess
ResumeThread
GetVersionExA
VirtualProtectEx
SuspendThread
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
WriteProcessMemory
GetStartupInfoA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
GetCurrentThread
LoadLibraryA
GetShortPathNameA
GetProcAddress
SetThreadContext
SetFileTime
GetFileTime
ReadFile
ReleaseMutex
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SetLastError
SleepEx
CreateThread
WriteFile
GetDiskFreeSpaceA
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetPriorityClass
SetThreadPriority
GetCurrentProcess
ContinueDebugEvent
WaitForDebugEvent
ReadProcessMemory
WaitForSingleObject
CreateFileA
GetEnvironmentVariableA
LCMapStringW
GetLastError
SetProcessWorkingSetSize
FlushFileBuffers
GetSystemTime
GetLocalTime
CompareStringW
CompareStringA
LCMapStringA
GetOEMCP
GetACP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
HeapReAlloc
VirtualAlloc
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetEnvironmentVariableW
MultiByteToWideChar
GetVersion
ExitProcess
user32
EnumWindows
DestroyWindow
SendMessageTimeoutA
GetWindowThreadProcessId
UpdateWindow
SystemParametersInfoA
CreateDialogParamA
TranslateMessage
SetTimer
GetDlgItem
SendMessageA
GetMessageA
EndPaint
IsWindow
BeginPaint
ShowWindow
LoadCursorA
GetSystemMetrics
PostQuitMessage
PostMessageA
KillTimer
RegisterClassA
DefWindowProcA
RegisterWindowMessageA
WaitForInputIdle
CreateWindowExA
MessageBoxA
SetWindowTextA
DispatchMessageA
gdi32
SelectPalette
CreateDCA
RealizePalette
DeleteObject
BitBlt
CreatePalette
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBitmap
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ