Static task
static1
Behavioral task
behavioral1
Sample
ef80cdffefafd2824e8d6936c6e6ab5df620e6ac616ff919fefed922c8bbe937.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ef80cdffefafd2824e8d6936c6e6ab5df620e6ac616ff919fefed922c8bbe937.exe
Resource
win10v2004-20220812-en
General
-
Target
ef80cdffefafd2824e8d6936c6e6ab5df620e6ac616ff919fefed922c8bbe937
-
Size
188KB
-
MD5
0c6701feba3164804948c62868397090
-
SHA1
ed82763d980e0b0652cb84663f68c975c73cb3de
-
SHA256
ef80cdffefafd2824e8d6936c6e6ab5df620e6ac616ff919fefed922c8bbe937
-
SHA512
352b82c86310ccef7c65051da9b1c5e1ed2d7f28fba50d7fba7899ed88a229a4725938a3b5794bdc2eeedd46b94e9cbc5be9b44c3501bd3ff91ffd6a293c547a
-
SSDEEP
3072:SZBzsiE1zi00QfsULQxBM311/ost0N8aYMs9ahVaAPlhNeeZI:SZBzW1zi0vfsK+MfBt8RYMZVaABe6I
Malware Config
Signatures
Files
-
ef80cdffefafd2824e8d6936c6e6ab5df620e6ac616ff919fefed922c8bbe937.exe windows x86
088eb11494b8c68b0c2b7ae5cf258c5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalFree
LocalSize
LocalReAlloc
GetProcessHeap
HeapAlloc
HeapFree
CreateEventA
MultiByteToWideChar
OpenProcess
VirtualAllocEx
CreateRemoteThread
CreateProcessA
DeviceIoControl
GlobalMemoryStatusEx
GetProcAddress
GetCurrentProcess
ExitProcess
SetLastError
GetLastError
SetFilePointer
ReadFile
WriteFile
RemoveDirectoryA
LocalAlloc
LocalFree
CreateDirectoryA
GetVersionExA
lstrcmpA
OutputDebugStringA
ReleaseMutex
GetModuleHandleA
GetStartupInfoA
GetModuleFileNameA
GetSystemDirectoryA
GetVersion
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetCurrentProcessId
FreeLibrary
Sleep
GetLocalTime
GetTickCount
SetEvent
lstrcpyA
VirtualAlloc
VirtualFree
CloseHandle
LoadLibraryA
SetErrorMode
user32
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
LoadCursorA
WindowFromPoint
GetKeyState
GetCursorPos
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetThreadDesktop
ReleaseDC
SetCapture
IsWindow
DispatchMessageA
TranslateMessage
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
MessageBoxA
ExitWindowsEx
CharNextA
GetMessageA
SetRect
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
OpenEventLogA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegRestoreKeyA
RegSaveKeyA
LookupAccountSidA
GetTokenInformation
OpenSCManagerA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
_strnicmp
strncat
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
atol
_strupr
strtok
wcscpy
_errno
strncmp
atoi
strcat
rename
strrchr
memset
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memcpy
memmove
ceil
_ftol
strlen
strstr
memcmp
rand
putchar
strcpy
puts
sprintf
strncpy
strchr
malloc
strcmp
free
_except_handler3
shlwapi
SHDeleteKeyA
ws2_32
getpeername
accept
listen
WSAStartup
recvfrom
__WSAFDIsSet
gethostname
bind
getsockname
inet_ntoa
htonl
WSASocketA
sendto
inet_addr
send
select
ntohs
socket
gethostbyname
htons
WSACleanup
setsockopt
connect
closesocket
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ