Static task
static1
Behavioral task
behavioral1
Sample
5efc2e18f1ad663eb6f2192c4fd29ac499b0a09f12e80392a43d4443929e9b6e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5efc2e18f1ad663eb6f2192c4fd29ac499b0a09f12e80392a43d4443929e9b6e.exe
Resource
win10v2004-20220812-en
General
-
Target
5efc2e18f1ad663eb6f2192c4fd29ac499b0a09f12e80392a43d4443929e9b6e
-
Size
24KB
-
MD5
9351b388a84ad7168659629332fdeb70
-
SHA1
672e998c20e50b18707e733006883c799fd5187b
-
SHA256
5efc2e18f1ad663eb6f2192c4fd29ac499b0a09f12e80392a43d4443929e9b6e
-
SHA512
d0093dc7ff0fd56edffd246d252878c3ca9b7f01e32ca02746ee5c1d16b63710f53ce5ed57bba53d14cc6fa26f14b455ac251cab11563bd9add54bebad723f28
-
SSDEEP
384:7OVj1BqlyFb49LHNnfGfIbx1g8C0sO0Wyjor18P8IxufLWqatJR+JoJaGBfS5nDC:7sSyFb4dH5Gfi1jZs7WAor1U8IxuDnkn
Malware Config
Signatures
Files
-
5efc2e18f1ad663eb6f2192c4fd29ac499b0a09f12e80392a43d4443929e9b6e.exe windows x86
1ac1b5df0581efad684c724c3fed12f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualProtect
CreateEventA
MapViewOfFile
ResumeThread
IsBadWritePtr
GetProcAddress
GetEnvironmentStrings
GetFileType
GetLogicalDriveStringsA
GetConsoleCP
EndUpdateResourceA
GetPriorityClass
WritePrivateProfileStructA
SetFileAttributesA
GetFileAttributesA
IsSystemResumeAutomatic
CancelWaitableTimer
GlobalCompact
ReadConsoleA
GetProcessVersion
FindFirstChangeNotificationA
LockFile
IsBadCodePtr
GetLastError
GetThreadPriority
FindNextChangeNotification
GetUserDefaultUILanguage
DuplicateHandle
UpdateResourceA
IsBadStringPtrA
AreFileApisANSI
GetThreadLocale
GetThreadPriorityBoost
GetProcessWorkingSetSize
GetNamedPipeInfo
HeapDestroy
GetModuleFileNameA
GetFileTime
GetFileSize
CreateRemoteThread
ContinueDebugEvent
IsDebuggerPresent
WaitForSingleObject
GetSystemDirectoryA
WriteProfileSectionA
CommConfigDialogA
CreateMutexA
GetThreadTimes
DisconnectNamedPipe
GlobalFree
OpenMutexA
OpenProcess
FindCloseChangeNotification
MoveFileA
GetOEMCP
GetVersion
CopyFileA
LocalLock
GetTickCount
FindResourceExA
WaitForMultipleObjects
SizeofResource
FreeConsole
GetCPInfo
DeleteFileA
GetExitCodeProcess
ReadProcessMemory
Sleep
SetEvent
ClearCommBreak
LoadLibraryExA
GetACP
GetWindowsDirectoryA
GetCommModemStatus
LockResource
HeapValidate
FindAtomA
GetPrivateProfileSectionNamesA
WaitForSingleObjectEx
Beep
MoveFileExA
GetProcessHeap
HeapAlloc
PeekConsoleInputA
QueryDosDeviceA
VirtualProtectEx
MapViewOfFileEx
GetDriveTypeA
BeginUpdateResourceA
RemoveDirectoryA
UnmapViewOfFile
GetExitCodeThread
VirtualLock
FreeLibrary
GetHandleInformation
UnlockFile
HeapReAlloc
VirtualAlloc
SetFilePointer
PurgeComm
LocalFree
GetSystemDefaultLangID
CreateFileA
GlobalWire
GlobalLock
GetUserDefaultLangID
GetProcessTimes
GetShortPathNameA
GetMailslotInfo
VirtualFreeEx
GetCommMask
GetConsoleCursorInfo
WriteFile
WaitForMultipleObjectsEx
ReadFile
SetLastError
CloseHandle
HeapFree
GetStdHandle
DeleteFiber
EraseTape
CopyFileExA
GetCommandLineA
GetModuleHandleA
FindClose
GetProfileStringA
DeviceIoControl
FlushViewOfFile
GetProfileIntA
IsBadHugeReadPtr
CreateDirectoryA
DosDateTimeToFileTime
GetTempPathA
CreateWaitableTimerA
FoldStringA
LocalAlloc
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE