Static task
static1
Behavioral task
behavioral1
Sample
ef54b64d416d17100383f7d32a7fe850174d1a6a66b7134af64877289d528964.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef54b64d416d17100383f7d32a7fe850174d1a6a66b7134af64877289d528964.exe
Resource
win10v2004-20220812-en
General
-
Target
ef54b64d416d17100383f7d32a7fe850174d1a6a66b7134af64877289d528964
-
Size
12KB
-
MD5
80bfac82b5c5c1e3056d3974368fc2e2
-
SHA1
ecd72fb039075286f9c34d7d23cc2f48a772934e
-
SHA256
ef54b64d416d17100383f7d32a7fe850174d1a6a66b7134af64877289d528964
-
SHA512
c1b4f777a43b733709cd84c896021e595e4965fd477fc16202e9d5e312c00fe9309a254fd6182c19eacd57cb376ac22dc8279f1cb7088d9a8e2a910467a218a3
-
SSDEEP
192:PZn0f+m8nNVI4TQOQa81ers82dafDZhNz5Hyn2SewMlXxmiCDpo9:V00HI4hcGs826vyQvxmNDpo9
Malware Config
Signatures
Files
-
ef54b64d416d17100383f7d32a7fe850174d1a6a66b7134af64877289d528964.exe windows x86
749ea44795816f3ea35f48cf1be55ae6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
OpenProcess
GetFileSize
CloseHandle
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WriteFile
lstrcmpiA
DeleteFileA
ResumeThread
CreateProcessA
Sleep
SetThreadPriority
GetCurrentThread
SetPriorityClass
VirtualAllocEx
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
FindNextFileA
FindClose
FindFirstFileA
GetDriveTypeA
WinExec
GetWindowsDirectoryA
CreateThread
LCMapStringA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
GetStringTypeA
WriteProcessMemory
CreateRemoteThread
ExitProcess
GetSystemDirectoryA
GetModuleFileNameA
GetCurrentProcess
CopyFileA
MultiByteToWideChar
LCMapStringW
user32
GetWindowThreadProcessId
FindWindowA
MessageBoxA
wsprintfA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ