Static task
static1
Behavioral task
behavioral1
Sample
eca700d0d71a335b56d64d407515e7fe61aa470484d4b5f9e015389ea93c6414.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eca700d0d71a335b56d64d407515e7fe61aa470484d4b5f9e015389ea93c6414.exe
Resource
win10v2004-20221111-en
General
-
Target
eca700d0d71a335b56d64d407515e7fe61aa470484d4b5f9e015389ea93c6414
-
Size
271KB
-
MD5
a8d7ee5d2566240208d3e88c5baf3e14
-
SHA1
09aec9e9064cdd38b56c2c0e83d49df1fee4385f
-
SHA256
eca700d0d71a335b56d64d407515e7fe61aa470484d4b5f9e015389ea93c6414
-
SHA512
1cb16851e8f957f9e1c74458fc07360a543ad52625658d21a4544cebc5057c63e40c518e3b6c61ae4a0f4a2390e7cb55696857a375ce4eb686643345768fae11
-
SSDEEP
3072:g4BoFWzrKDU0E2a/rhVaFQZ0zUk9oNuMj6Evj5rIe9Y9cUTbfHf62xFdO7bIJk:vaU0EZeQ6Uwotj6EvH9vUPf/XFc7bJ
Malware Config
Signatures
Files
-
eca700d0d71a335b56d64d407515e7fe61aa470484d4b5f9e015389ea93c6414.exe windows x86
1b451f0d60a9b01011845d32298fdab7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
DeleteMenu
gdi32
IntersectClipRect
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
advapi32
RegDeleteValueW
shell32
ExtractIconW
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCW
ole32
CoCreateInstance
oleaut32
VariantInit
zlib1
ord50
Sections
.text Size: 256KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE