Static task
static1
Behavioral task
behavioral1
Sample
ef510d5ac5775f371834eb8ee9751725b9db3447d74d67b4b4aeead39574f4f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef510d5ac5775f371834eb8ee9751725b9db3447d74d67b4b4aeead39574f4f9.exe
Resource
win10v2004-20220812-en
General
-
Target
ef510d5ac5775f371834eb8ee9751725b9db3447d74d67b4b4aeead39574f4f9
-
Size
178KB
-
MD5
515cd6e9fd12d87bebc6bbf34b73c57c
-
SHA1
d3a48605be5b86b8b70631dba5643e6e6a81fd29
-
SHA256
ef510d5ac5775f371834eb8ee9751725b9db3447d74d67b4b4aeead39574f4f9
-
SHA512
b9153b9bb8c4fe30a665d1f904a6913608c3a5dfd64488451c22ff7616ebe0d65962de2e4fb891e8ea3b88e63fdcda290be6163f347ecb94fe28089c884d8daf
-
SSDEEP
3072:iLRAqsUDSAEp4du/DuIMHlj7IC2q4PQc8bdfWAdU39XXM7urq9C2b:GzD4p4dqyYKnWAu9nMSr2R
Malware Config
Signatures
Files
-
ef510d5ac5775f371834eb8ee9751725b9db3447d74d67b4b4aeead39574f4f9.exe windows x86
2de26713dae297392682cde0a4da740f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
user32
SetActiveWindow
SendMessageW
PtInRect
LoadCursorA
MapVirtualKeyA
ScrollWindow
PeekMessageW
PeekMessageA
MessageBeep
LoadIconA
RegisterClassA
ReleaseCapture
OpenClipboard
MapWindowPoints
PostMessageA
MessageBoxA
OemToCharA
SendMessageA
LoadKeyboardLayoutA
PostQuitMessage
ScreenToClient
OffsetRect
RegisterWindowMessageA
RedrawWindow
RemoveMenu
ReleaseDC
RemovePropA
LoadBitmapA
LoadStringA
RegisterClipboardFormatA
shlwapi
SHDeleteKeyA
SHQueryValueExA
PathGetCharTypeA
SHGetValueA
PathFileExistsA
SHDeleteValueA
SHQueryInfoKeyA
SHEnumValueA
SHStrDupA
version
VerQueryValueA
kernel32
GetVersionExA
GetCommandLineW
SetThreadLocale
ExitProcess
SetErrorMode
GetDiskFreeSpaceA
WaitForSingleObject
lstrcmpiA
lstrlenA
LockResource
GetLocalTime
LoadLibraryA
GetModuleHandleA
GetCurrentProcess
lstrcpyA
GetModuleFileNameA
GetSystemDefaultLangID
SetHandleCount
GetModuleHandleW
GetCPInfo
RaiseException
GetStringTypeW
ResetEvent
IsBadHugeReadPtr
lstrlenW
lstrcmpA
GetFileType
GetUserDefaultLCID
CompareStringA
FindResourceA
LocalReAlloc
GetEnvironmentStrings
GetCommandLineA
GetStringTypeA
LocalAlloc
GetACP
GetProcessHeap
GetLastError
EnumCalendarInfoA
GetFileSize
VirtualAlloc
GlobalDeleteAtom
GetProcAddress
HeapAlloc
GlobalAlloc
WideCharToMultiByte
SetEvent
HeapDestroy
ReadFile
CreateEventA
VirtualFree
SetLastError
GetFullPathNameA
GetThreadLocale
ExitThread
GetLocaleInfoA
GetDateFormatA
SetEndOfFile
lstrcatA
SizeofResource
MoveFileA
EnterCriticalSection
oleaut32
SysStringLen
SysReAllocStringLen
SysAllocStringLen
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ