Static task
static1
Behavioral task
behavioral1
Sample
ef8dcecdc482f25b1a3d9038f070bdc91c9a525fdfa0767fe43c08890db83a38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef8dcecdc482f25b1a3d9038f070bdc91c9a525fdfa0767fe43c08890db83a38.exe
Resource
win10v2004-20220812-en
General
-
Target
ef8dcecdc482f25b1a3d9038f070bdc91c9a525fdfa0767fe43c08890db83a38
-
Size
303KB
-
MD5
822f400e537a9fa30230cd71d98527c0
-
SHA1
922a7243cf9e7e5b9b587ac98b3520615bd02ac0
-
SHA256
ef8dcecdc482f25b1a3d9038f070bdc91c9a525fdfa0767fe43c08890db83a38
-
SHA512
2cd7523619aa7eb6522fdc61b89090678d10ae2fc2da9f5a451f17243ddf6e204b53657446d57b01b5109dd03f2b6b4b20c503181445d107e3c03ef3d84f04ba
-
SSDEEP
6144:7Mzb5hFVUXugrO9ZDMFVQnCNLsYwA4Z+hxkLlrRtZW:Ihm+ga/D4VQCN25Z+hxkhh
Malware Config
Signatures
Files
-
ef8dcecdc482f25b1a3d9038f070bdc91c9a525fdfa0767fe43c08890db83a38.exe windows x86
c359e6581d914cc25762887dafd7d5d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetStdHandle
CreateDirectoryA
ResumeThread
GetCommandLineA
SuspendThread
GetLocaleInfoA
GetProcessHeap
DeleteFileA
IsBadReadPtr
GetDriveTypeA
HeapSize
ReadConsoleA
GetModuleHandleA
SetEndOfFile
GetPriorityClass
CreatePipe
GlobalSize
ResumeThread
GetFileAttributesW
WriteFile
VirtualProtect
user32
DrawIcon
GetWindowLongA
DestroyIcon
SetRect
GetWindowTextW
PeekMessageA
GetScrollInfo
wsprintfA
SetCursor
DestroyMenu
GetWindowLongA
LoadCursorA
DispatchMessageA
els
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE