Static task
static1
Behavioral task
behavioral1
Sample
ed0eec53e1e6383241a9ea1f19ee684e9ded4e7497c720c9c86b6ae4d4b5f814.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ed0eec53e1e6383241a9ea1f19ee684e9ded4e7497c720c9c86b6ae4d4b5f814.exe
Resource
win10v2004-20230221-en
General
-
Target
ed0eec53e1e6383241a9ea1f19ee684e9ded4e7497c720c9c86b6ae4d4b5f814
-
Size
961KB
-
MD5
0e4ae0e2b9311d02bf4ee0f8dc9b1c96
-
SHA1
4e8391f8b0033b4a55c920f8ba1be62fe8162d09
-
SHA256
ed0eec53e1e6383241a9ea1f19ee684e9ded4e7497c720c9c86b6ae4d4b5f814
-
SHA512
74fb6a8114b9f9c39a6369f25c00303ad964b6a3fc19a80c7d95e9fbac42ceba61e51ddbc41ccaeae3c72776cb9c422ecfe2e8e773b8f7079193d96844a15c48
-
SSDEEP
24576:ZEAAktIUbfr+RYXGF8rqZlFiZOF0TUMd56CZL8:ZWCIUbKRYXGF8rqZlF
Malware Config
Signatures
Files
-
ed0eec53e1e6383241a9ea1f19ee684e9ded4e7497c720c9c86b6ae4d4b5f814.exe windows x64
6dba81ae06573fd847d178a6ba09d8a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
HeapCreate
HeapFree
InitializeCriticalSectionEx
EnumSystemCodePagesW
HeapSize
GetLastError
HeapReAlloc
CloseHandle
RaiseException
HeapAlloc
DeleteCriticalSection
GetProcessHeap
CreateFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetFileType
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
LCMapStringW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
LocalFree
CreateEventW
GetModuleHandleW
GetProcAddress
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetACP
user32
TranslateAcceleratorW
GetMessageW
DefWindowProcW
DestroyWindow
CreateWindowExW
EndDialog
EndPaint
LoadAcceleratorsW
LoadStringW
ShowWindow
DispatchMessageW
RegisterClassExW
TranslateMessage
LoadIconW
LoadCursorW
PostQuitMessage
DialogBoxParamW
UpdateWindow
BeginPaint
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantClear
rpcrt4
UuidFromStringA
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 597KB - Virtual size: 597KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ