Static task
static1
Behavioral task
behavioral1
Sample
eabd507aa603f3319b0280e3c4d147e8db72115cf593b56e8abb529b7d0df76c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eabd507aa603f3319b0280e3c4d147e8db72115cf593b56e8abb529b7d0df76c.exe
Resource
win10v2004-20221111-en
General
-
Target
eabd507aa603f3319b0280e3c4d147e8db72115cf593b56e8abb529b7d0df76c
-
Size
269KB
-
MD5
c6401b481a5962211f547d9a218617d3
-
SHA1
689eadd5022256540e8354e2d8111643603a273a
-
SHA256
eabd507aa603f3319b0280e3c4d147e8db72115cf593b56e8abb529b7d0df76c
-
SHA512
d6f9b5c6b09c7b36ebe336a9bfa8a8d5e448e293b25ec52811889352bebbdda384ddb9b35f571f50e3d63627922ca611ff2f33a5013df228767683bb93ebdf71
-
SSDEEP
3072:fwHJABvMRyuTDL9KlI9Z+rGkfVKYMfAxGl1HkNKLTDLtt:umBvMRrBKlWorYfA0FDb
Malware Config
Signatures
Files
-
eabd507aa603f3319b0280e3c4d147e8db72115cf593b56e8abb529b7d0df76c.exe windows x86
201f42e9b22d00fdd223b0bdb46e5080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
kernel32
WideCharToMultiByte
GetCurrentThreadId
MultiByteToWideChar
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
SetLastError
FreeLibrary
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
OpenProcess
FindNextFileA
FindClose
GetFullPathNameA
FindFirstFileA
MoveFileExA
RemoveDirectoryA
Sleep
WaitForSingleObject
LocalFree
FormatMessageA
InterlockedExchange
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
WriteFile
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
GetStartupInfoA
GetCommandLineA
VirtualQuery
GetCurrentProcess
FlushInstructionCache
CreateMutexA
CloseHandle
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
GetSystemInfo
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
VirtualProtect
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
UnhandledExceptionFilter
TerminateProcess
HeapSize
HeapReAlloc
HeapDestroy
SetEndOfFile
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
user32
GetSystemMetrics
PostQuitMessage
LoadImageA
GetParent
GetWindow
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowRgn
UnregisterClassA
EnableWindow
RedrawWindow
GetWindowRect
SetWindowPos
SetWindowTextA
PostMessageA
OffsetRect
IsWindow
GetDlgItem
GetWindowLongA
CallWindowProcA
CreateDialogParamA
DefWindowProcA
CharNextA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
SetWindowLongA
DestroyWindow
SendMessageA
IsDialogMessageA
gdi32
CreateRoundRectRgn
CreatePatternBrush
GetObjectA
SetTextColor
SetBkMode
CreateSolidBrush
DeleteObject
advapi32
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
shell32
SHCreateDirectoryExA
SHFileOperationA
ShellExecuteExA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoCreateInstance
oleaut32
VarUI4FromStr
shlwapi
PathFileExistsA
comctl32
InitCommonControlsEx
gdiplus
GdiplusShutdown
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ