Static task
static1
Behavioral task
behavioral1
Sample
eb3b0c091e4ba48c28181e99e4e03daa4d69ef14aaa7375f718a17990afc3ce9.exe
Resource
win10-20220812-en
General
-
Target
eb3b0c091e4ba48c28181e99e4e03daa4d69ef14aaa7375f718a17990afc3ce9
-
Size
294KB
-
MD5
8fb01de2c5bf7c12bd6524ef482c871e
-
SHA1
10286e9349a1151288bc31d1cf49b8b99f7b71b9
-
SHA256
eb3b0c091e4ba48c28181e99e4e03daa4d69ef14aaa7375f718a17990afc3ce9
-
SHA512
9d3df74263ba70b29946c18c0b00ca2954b278f5336b93c998a52b6df83859510b719676f7f6108906cced757d12d67f16a4b8d28010928c863f0041d052e6bd
-
SSDEEP
3072:5muqy0K9LVkoRoiMOSng62vLsggO8aaJJgDVPMkABX9l7f43H7BFaRCRCq:bV0K9LiF/PSsgx8/gD4b7f4V06
Malware Config
Signatures
Files
-
eb3b0c091e4ba48c28181e99e4e03daa4d69ef14aaa7375f718a17990afc3ce9.exe windows x86
78339dc1c5de0e493ea2b28607ce356e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadStringPtrW
InterlockedIncrement
GetCurrentProcess
SetHandleInformation
GetGeoInfoW
GetConsoleAliasExesW
GetDateFormatA
SetProcessPriorityBoost
FindResourceExA
GlobalAlloc
LoadLibraryW
DnsHostnameToComputerNameW
WriteConsoleW
EnumResourceLanguagesA
LCMapStringA
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
HeapSize
EnumSystemCodePagesW
LoadLibraryA
WriteConsoleA
GetProcessWorkingSetSize
AddAtomW
GetCommMask
SetCommMask
FoldStringA
GetModuleHandleA
CancelTimerQueueTimer
BuildCommDCBA
GetCPInfoExA
SetCalendarInfoA
EndUpdateResourceA
TerminateJobObject
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
RaiseException
user32
GetListBoxInfo
DdeQueryStringA
LoadMenuW
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hudoz Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ