Static task
static1
Behavioral task
behavioral1
Sample
ef0aaba83ddc2390f4c79992dbb7a8e0335826285ae1e5863f944d838f62f01a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef0aaba83ddc2390f4c79992dbb7a8e0335826285ae1e5863f944d838f62f01a.exe
Resource
win10v2004-20220812-en
General
-
Target
ef0aaba83ddc2390f4c79992dbb7a8e0335826285ae1e5863f944d838f62f01a
-
Size
702KB
-
MD5
8337af49e5bc5b02eab403dd4200b7f0
-
SHA1
3a0f0ab30f0fd8d8f2589f208399e63829e69411
-
SHA256
ef0aaba83ddc2390f4c79992dbb7a8e0335826285ae1e5863f944d838f62f01a
-
SHA512
38e2d3ef62efe1153d5b00498755774697ab082236c36400fc339f5af40ded79b337a8ad0c964b1a1862536d22a461f4d466b9ed16a18c2d86350c05d19c6001
-
SSDEEP
12288:WfbjnPbVnIiqdjQ+Nxm9t4F4RsObh8r+EePiPX37HuTgcXJ1GzX6mzV42f7esaSw:ofnVIXC+Nxit4F4RsObur+nPiPX3j/8z
Malware Config
Signatures
Files
-
ef0aaba83ddc2390f4c79992dbb7a8e0335826285ae1e5863f944d838f62f01a.exe windows x86
40a673059901dd8dccd98ef6db0a3740
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetSpecialFolderLocation
CommandLineToArgvW
ShellExecuteW
SHGetFileInfoW
SHGetMalloc
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHChangeNotify
kernel32
WaitForSingleObject
CreateProcessW
SetFileApisToOEM
GetShortPathNameW
SetThreadPriority
SetPriorityClass
GetLastError
GetCurrentDirectoryW
GetModuleFileNameW
GetEnvironmentVariableW
GetCurrentProcess
GetCurrentThread
GetCommandLineW
LocalFree
FormatMessageW
GetModuleHandleW
FindResourceW
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
InterlockedIncrement
InterlockedDecrement
FindClose
FindFirstFileW
FindNextFileW
FileTimeToSystemTime
GetProcAddress
FreeLibrary
GetCurrentThreadId
CloseHandle
ResumeThread
Sleep
GetTempFileNameW
MoveFileW
CreateFileW
lstrlenW
GetTempPathW
GetFullPathNameW
SetFileTime
GetLongPathNameW
SetFilePointer
GetFileSize
ReadFile
SetEndOfFile
WriteFile
SetCurrentDirectoryW
GetDiskFreeSpaceExW
GetVersionExW
GetDiskFreeSpaceW
GetVolumeInformationW
CreateFileA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
HeapReAlloc
VirtualAlloc
GetConsoleMode
GetConsoleCP
LeaveCriticalSection
EnterCriticalSection
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
CreateEventW
SetEvent
ResetEvent
ExpandEnvironmentStringsW
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
ExitThread
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
user32
LoadStringW
GetDesktopWindow
ScreenToClient
GetMessageW
IsWindowVisible
EnableWindow
PostQuitMessage
LoadIconW
KillTimer
CreateDialogParamW
SetTimer
TranslateMessage
DestroyIcon
IsWindow
SendMessageW
MessageBoxW
GetWindowRect
GetSystemMetrics
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowTextW
SetWindowTextW
GetDlgItem
EndDialog
DispatchMessageW
IsDialogMessageW
ShowWindow
gdi32
DeleteObject
CreateSolidBrush
advapi32
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateInstance
CoInitializeEx
Sections
.text Size: 291KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ