Static task
static1
Behavioral task
behavioral1
Sample
ef548e44ca7e04c1a46758d5db5ac006bd9406f990f23b0d9f29e664a98a71ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef548e44ca7e04c1a46758d5db5ac006bd9406f990f23b0d9f29e664a98a71ac.exe
Resource
win10v2004-20220901-en
General
-
Target
ef548e44ca7e04c1a46758d5db5ac006bd9406f990f23b0d9f29e664a98a71ac
-
Size
60KB
-
MD5
6e6559f51c68d225bbf994083b37d59f
-
SHA1
fc8561a46fcb0e86a8866d642c0ec8b7c99c86c7
-
SHA256
ef548e44ca7e04c1a46758d5db5ac006bd9406f990f23b0d9f29e664a98a71ac
-
SHA512
0e72d5d51c6a5f61e8aa38d42d461fc8d0b39698467a02cc2e24bf14e9c9ca22830f02f4d5e5d531192bc1ab6660132b96cbc2cf2913ef917242b772708c6bd0
-
SSDEEP
768:7HQhQlbmKgjT+jDAwVZbt6Jo0SdiMJrUbB0Ez1JgaBLCMP1hIYYikMxublz5:7HfmzSVZx6CLJJnEpJpYYBglz
Malware Config
Signatures
Files
-
ef548e44ca7e04c1a46758d5db5ac006bd9406f990f23b0d9f29e664a98a71ac.exe windows x86
7ef9863b63f8a4c304861d221fa38b82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapReAlloc
HeapSize
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
lstrcatA
lstrcpyA
GetTickCount
ReleaseMutex
lstrlenA
GetShortPathNameA
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
CreateMutexA
lstrcmpA
GetModuleHandleA
GetCommandLineA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
LocalFree
CompareFileTime
GlobalFree
GlobalAlloc
GetSystemDefaultLCID
GetVolumeInformationA
GetWindowsDirectoryA
CloseHandle
TerminateProcess
OpenProcess
lstrcmpiA
WriteFile
GetProcessHeap
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
GetFileAttributesA
GetStdHandle
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
VirtualAlloc
GetCPInfo
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetLocaleInfoA
GetACP
DeleteFileA
InterlockedExchange
GetOEMCP
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
ExitProcess
GetStartupInfoA
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
user32
PostQuitMessage
DefWindowProcA
wsprintfA
SendMessageA
CharUpperA
PeekMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
DestroyWindow
UpdateWindow
advapi32
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE