Static task
static1
Behavioral task
behavioral1
Sample
ef55dd0ec7b0596ca35199e532498937ccd5004030d4ca307cae4c8701a70437.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef55dd0ec7b0596ca35199e532498937ccd5004030d4ca307cae4c8701a70437.exe
Resource
win10v2004-20220812-en
General
-
Target
ef55dd0ec7b0596ca35199e532498937ccd5004030d4ca307cae4c8701a70437
-
Size
122KB
-
MD5
ad1f9f1ca4b0f8c9827ccf0e3d993791
-
SHA1
c71b16a9b004fe41e3881ad44e18c65f025c2370
-
SHA256
ef55dd0ec7b0596ca35199e532498937ccd5004030d4ca307cae4c8701a70437
-
SHA512
d3f0726bae5abd19f6faeee0f0c57349532e91177f2c10473eb070e9cb650bc5d645ef4eb9ba1861395be4daa756c20ffa45f64c4167eb9f21b7121a79224e04
-
SSDEEP
1536:MCvcGuOt+/SmgkOxdSH4aqNAgOiutlftwn3k6nmezWZJC2eKC4IKMNSrS8:MCvcY+/rgjSppDJw3k6n/CC9KYSm8
Malware Config
Signatures
Files
-
ef55dd0ec7b0596ca35199e532498937ccd5004030d4ca307cae4c8701a70437.exe windows x86
70a093ceec1390e9befffc9e8288f60b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysFreeString
user32
ScreenToClient
GetMenuState
EnableScrollBar
TranslateMessage
DestroyCursor
DrawIconEx
CreatePopupMenu
ShowScrollBar
EnumChildWindows
IsIconic
GetActiveWindow
GetMenu
MapVirtualKeyA
GetIconInfo
RegisterWindowMessageA
GetKeyboardLayout
MessageBoxA
GetPropA
RemovePropA
EmptyClipboard
IsWindowUnicode
OpenClipboard
FindWindowA
DrawTextA
PeekMessageW
wsprintfA
TranslateMDISysAccel
CharNextA
CharNextW
GetSystemMetrics
DefMDIChildProcA
IsWindowVisible
WaitMessage
RedrawWindow
GetWindow
SetMenu
DrawAnimatedRects
SetFocus
MoveWindow
CreateWindowExA
GetCursor
GetScrollRange
GetKeyboardLayoutList
GetScrollPos
PtInRect
InsertMenuA
EnableWindow
GetSysColor
SetParent
ReleaseCapture
GetKeyboardState
RegisterClassA
CharLowerBuffA
GetClassNameA
LoadBitmapA
GetCursorPos
MessageBeep
ShowOwnedPopups
SetTimer
DestroyWindow
CharUpperBuffA
InflateRect
GetWindowLongW
DrawMenuBar
SetScrollInfo
ActivateKeyboardLayout
IsRectEmpty
SendMessageA
WindowFromPoint
GetWindowTextA
GetParent
ChildWindowFromPoint
SetScrollPos
SetWindowPos
SetWindowTextA
SetActiveWindow
GetKeyNameTextA
SetWindowLongW
DeleteMenu
PostMessageA
SetCapture
TrackPopupMenu
FillRect
SendMessageW
SetWindowLongA
IsZoomed
GetClassInfoA
CloseClipboard
GetDesktopWindow
DispatchMessageW
IsWindowEnabled
IsDialogMessageW
GetLastActivePopup
LoadStringA
GetMenuItemCount
IsChild
GetKeyState
GetMenuStringA
SystemParametersInfoA
CharToOemA
GetTopWindow
GetMenuItemInfoA
GetWindowRect
GetSystemMenu
CreateIcon
ScrollWindow
SetClassLongA
SetWindowPlacement
GetScrollInfo
GetFocus
UnhookWindowsHookEx
UnregisterClassA
KillTimer
EqualRect
LoadIconA
CreateMenu
GetForegroundWindow
PeekMessageA
GetSubMenu
DestroyMenu
CheckMenuItem
GetDlgItem
GetWindowDC
SetScrollRange
DestroyIcon
SetCursor
PostQuitMessage
ReleaseDC
DrawEdge
LoadKeyboardLayoutA
GetMenuItemID
LoadCursorA
CharLowerA
EnumWindows
GetWindowThreadProcessId
GetClipboardData
CallWindowProcA
GetDC
RegisterClipboardFormatA
MapWindowPoints
DrawFrameControl
ClientToScreen
GetMessagePos
CallNextHookEx
IsDialogMessageA
InvalidateRect
IsWindow
EnumThreadWindows
OemToCharA
EnableMenuItem
SetForegroundWindow
GetSysColorBrush
MsgWaitForMultipleObjects
DefFrameProcA
DrawIcon
DispatchMessageA
GetKeyboardType
ShowWindow
OffsetRect
IntersectRect
FrameRect
GetKeyboardLayoutNameA
RemoveMenu
SetPropA
GetWindowLongA
GetClientRect
BeginPaint
GetWindowPlacement
SetWindowsHookExA
AdjustWindowRectEx
UpdateWindow
GetClassLongA
GetDCEx
GetCapture
SetMenuItemInfoA
DefWindowProcA
EndPaint
SetClipboardData
comdlg32
FindTextA
ChooseColorA
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
version
GetFileVersionInfoA
VerFindFileA
advapi32
RegQueryInfoKeyA
RegEnumKeyA
RegOpenKeyA
shell32
SHGetDiskFreeSpaceA
gdi32
GetDIBits
GetCurrentPositionEx
GetClipBox
SelectPalette
GetObjectA
kernel32
FindFirstFileA
LocalAlloc
GetLastError
GlobalFindAtomA
MulDiv
ExitProcess
VirtualAllocEx
GetModuleHandleA
GetProcAddress
GetOEMCP
GlobalAddAtomA
CreateFileA
LoadLibraryA
VirtualAlloc
HeapDestroy
VirtualQuery
Sections
CODE Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 877B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ