Static task
static1
Behavioral task
behavioral1
Sample
efaf05db179947893b6069e38b0711a794fe259c82ff4039b77b15a023118ce4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efaf05db179947893b6069e38b0711a794fe259c82ff4039b77b15a023118ce4.exe
Resource
win10v2004-20220812-en
General
-
Target
efaf05db179947893b6069e38b0711a794fe259c82ff4039b77b15a023118ce4
-
Size
108KB
-
MD5
c29b05e2d5fe9bca5546f2b3d027f9ed
-
SHA1
f39af2c253aab2332b13f5e0d0da8270f1d2c5dc
-
SHA256
efaf05db179947893b6069e38b0711a794fe259c82ff4039b77b15a023118ce4
-
SHA512
77727f54fdff48f14c82c03c072b09db3985635b931f057f743c457625a6abc1e90f24eb847dfa8ea76dc5e36311b82cf6cdef372e52ac540154484f85e575c4
-
SSDEEP
1536:66Oal1NrfIoChy4FKtUL+owariik/M3olhkIOMnToIftIP7Zule119:YaChdC6waeJM3AhKgTBftE7Zule119
Malware Config
Signatures
Files
-
efaf05db179947893b6069e38b0711a794fe259c82ff4039b77b15a023118ce4.exe windows x86
a009b1205701cd71c21ac9c996dfaa32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
MoveFileExA
GetTempPathA
GetModuleFileNameA
GetSystemDirectoryA
FreeLibrary
GetCurrentProcess
GetVersionExA
OpenEventA
ExitProcess
GetExitCodeProcess
GetShortPathNameA
GetCurrentThreadId
WriteFile
HeapAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
lstrcmpiA
Process32Next
Process32First
OpenProcess
GetStartupInfoA
GetModuleHandleA
OutputDebugStringA
TerminateThread
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
GetWindowsDirectoryA
GetTickCount
GetProcessHeap
HeapFree
SetLastError
LoadLibraryA
GetProcAddress
CreateThread
MoveFileA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
InitializeCriticalSection
Sleep
DeleteCriticalSection
CreateMutexA
user32
GetInputState
LoadCursorA
DestroyCursor
SendMessageA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
PostMessageA
CharNextA
wsprintfA
GetMessageA
PostThreadMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetCursorInfo
GetCursorPos
ReleaseDC
gdi32
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
advapi32
CloseServiceHandle
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenServiceA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
CreateServiceA
OpenSCManagerA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
QueryServiceStatus
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
realloc
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
strchr
strncat
sprintf
rand
_strcmpi
exit
strncpy
strcat
strcpy
strcmp
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
printf
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
memcmp
free
malloc
_except_handler3
strrchr
ws2_32
select
recv
closesocket
htons
send
gethostname
getsockname
socket
connect
setsockopt
WSAStartup
WSACleanup
WSAIoctl
gethostbyname
msvcp60
??1Init@ios_base@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0Init@ios_base@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ