Static task
static1
Behavioral task
behavioral1
Sample
effc20e41a36dc8d195937986118ba985c5fb1a4c945853844850f510a902975.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
effc20e41a36dc8d195937986118ba985c5fb1a4c945853844850f510a902975.exe
Resource
win10v2004-20220812-en
General
-
Target
effc20e41a36dc8d195937986118ba985c5fb1a4c945853844850f510a902975
-
Size
216KB
-
MD5
0f13dff604d6b04c07d5b406b5af9970
-
SHA1
91b9f6645732e72639914b51f9f51eb0f0349d43
-
SHA256
effc20e41a36dc8d195937986118ba985c5fb1a4c945853844850f510a902975
-
SHA512
a2bb405b306830f61899a45fb7734ec51352048dc100b069c90eb2da679361c62793a49b4b7f31dc732af9b403123017ecef9dd3e67805c111d3d4d2372415ac
-
SSDEEP
3072:edW93tBHuYm8fqiLFaJwKnE7BN7lUDblrnrHylW35A5RuvQoZfe7ZQxmMP:33fqiLFcnKBN7WDbxKWJUuPfeVC
Malware Config
Signatures
Files
-
effc20e41a36dc8d195937986118ba985c5fb1a4c945853844850f510a902975.exe windows x86
bd7b64e73ca15b8d6bac9e1c82d894d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
lstrlenA
lstrcmpiA
Sleep
CreateThread
CreateEventA
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
IsDBCSLeadByte
SetEvent
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetNativeSystemInfo
GetCommandLineA
GlobalFree
GlobalLock
GlobalAlloc
FindClose
FindFirstFileA
GetWindowsDirectoryA
GetPrivateProfileSectionA
GetLastError
GetProcAddress
LoadLibraryA
ReadFile
CreateFileW
LoadLibraryW
GetVolumeInformationA
GetSystemTime
CreateFileA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetPrivateProfileStringA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
HeapReAlloc
GetProcessHeap
GetStartupInfoA
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
WriteFile
GetStdHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
GetCPInfo
GetOEMCP
IsValidCodePage
user32
DispatchMessageA
GetMessageA
TranslateMessage
PostThreadMessageA
CharNextA
CharUpperA
UnregisterClassA
advapi32
RegDeleteValueA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
ole32
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
StringFromGUID2
CLSIDFromString
PropVariantClear
CoCreateInstance
shell32
SHGetSpecialFolderPathW
SHGetFolderPathA
SHGetSpecialFolderPathA
oleaut32
SysAllocString
SysFreeString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
shlwapi
PathGetDriveNumberA
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uzsbsdg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE