Static task
static1
Behavioral task
behavioral1
Sample
5ef8700cb602b8ad915dc8e98f70e4c43cb9284af57d9eb149d9ddfaf186c8ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5ef8700cb602b8ad915dc8e98f70e4c43cb9284af57d9eb149d9ddfaf186c8ee.exe
Resource
win10v2004-20220812-en
General
-
Target
5ef8700cb602b8ad915dc8e98f70e4c43cb9284af57d9eb149d9ddfaf186c8ee
-
Size
192KB
-
MD5
e3e18ff9863d19de306f90a1d34044ba
-
SHA1
34dac76b03b997586f82c331f320c88b0f410146
-
SHA256
5ef8700cb602b8ad915dc8e98f70e4c43cb9284af57d9eb149d9ddfaf186c8ee
-
SHA512
fde928b12a5ce11d153a27f35c4827a5681b540da8036c62112656ce5a68e8289b47894d8eb65cda58321a2cb640363db29ac7240c21df335de3a32dce73cf81
-
SSDEEP
3072:W/gplACnTSf/u64VkcQy6adAZQxAjJnRTyWWvZTQHYI:WwAMTOuVVk6HhAS0
Malware Config
Signatures
Files
-
5ef8700cb602b8ad915dc8e98f70e4c43cb9284af57d9eb149d9ddfaf186c8ee.exe windows x86
c4d17b5fba8536a5d607d40398f8b1c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualLock
GetConsoleInputExeNameA
GetTimeFormatA
GetFileAttributesA
TerminateJobObject
CreateDirectoryExA
GetTempPathA
WaitForSingleObject
LockFile
BeginUpdateResourceA
VirtualAllocEx
CopyFileExW
GetProcessHeap
GetProcessId
GetConsoleAliasA
VirtualAlloc
GetProcessVersion
ReadConsoleInputA
ReleaseSemaphore
GlobalFlags
GetThreadLocale
OpenProcess
QueryDosDeviceA
PeekConsoleInputA
DeleteAtom
GetConsoleAliasExesLengthA
GetTapeStatus
GetThreadContext
GetAtomNameA
GetConsoleOutputCP
IsProcessorFeaturePresent
SetStdHandle
CopyFileExA
GetFileAttributesExA
HeapQueryInformation
GetFileType
ReadConsoleInputA
EnumSystemLocalesA
SetConsoleHardwareState
OpenWaitableTimerA
TransmitCommChar
GetComputerNameA
VirtualFreeEx
GlobalDeleteAtom
HeapDestroy
GetPrivateProfileSectionNamesA
SleepEx
GetDefaultCommConfigA
SetCurrentDirectoryA
GetProcessTimes
WriteConsoleOutputAttribute
GetStringTypeExA
GetWindowsDirectoryA
Module32First
DisconnectNamedPipe
UnlockFile
GetComputerNameExA
SetFirmwareEnvironmentVariableA
GetSystemDefaultLCID
GetDllDirectoryA
GetCommTimeouts
VirtualQueryEx
GetShortPathNameA
WriteConsoleOutputCharacterA
GetDevicePowerState
GetDiskFreeSpaceA
GlobalGetAtomNameA
OpenThread
GetProcessIoCounters
GetConsoleAliasesLengthA
WriteProcessMemory
GetNamedPipeInfo
GetSystemWindowsDirectoryA
GetCurrentThreadId
secur32
TranslateNameW
user32
GetListBoxInfo
SetSysColorsTemp
CallMsgFilter
CheckMenuRadioItem
SetWindowsHookA
MonitorFromRect
GrayStringA
EnableScrollBar
CharLowerA
MessageBoxExA
FrameRect
ToAsciiEx
SetInternalWindowPos
GetLayeredWindowAttributes
DefWindowProcA
MapVirtualKeyExW
DrawCaptionTempA
CharLowerBuffA
EndDialog
CopyAcceleratorTableA
ChangeDisplaySettingsA
PrivateExtractIconExA
RegisterUserApiHook
SetWinEventHook
CharLowerBuffW
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
UnregisterClassA
SendMessageCallbackA
DrawMenuBarTemp
ClientToScreen
GetDlgItemTextA
SetShellWindow
SetDoubleClickTime
SetRect
RegisterTasklist
CalcMenuBar
GetDlgCtrlID
DlgDirListA
CloseWindowStation
GetClassInfoExA
LockWorkStation
GetInputState
GetClassNameA
SetMessageQueue
SetShellWindowEx
RegisterRawInputDevices
LoadKeyboardLayoutA
CharLowerA
IntersectRect
LoadIconA
GetDlgCtrlID
ScrollWindow
DlgDirListA
SetScrollInfo
SendMessageCallbackA
DisableProcessWindowsGhosting
GetClientRect
SetWindowsHookExW
SetCursorPos
RegisterClassExA
GetRawInputData
CreateMDIWindowA
DialogBoxIndirectParamA
RegisterHotKey
SetDoubleClickTime
GetClipboardSequenceNumber
SendIMEMessageExA
LoadAcceleratorsA
SetCursorPos
LoadKeyboardLayoutEx
GetMenuItemInfoA
DestroyAcceleratorTable
RegisterRawInputDevices
SendMessageCallbackA
MenuItemFromPoint
GetWindowTextLengthA
RegisterWindowMessageA
SendMessageTimeoutA
GetUserObjectInformationA
SendMessageTimeoutW
GetMouseMovePointsEx
GetMenuStringA
MonitorFromRect
RegisterHotKey
SetPropA
UpdateWindow
SetSysColorsTemp
EnumDisplaySettingsExW
DialogBoxIndirectParamA
GetRegisteredRawInputDevices
GetCursorPos
RegisterClassA
GetSystemMetrics
SetProcessWindowStation
GetThreadDesktop
EnumPropsExA
TranslateMessage
AnimateWindow
CreateIconFromResource
IsDialogMessageA
SetWindowsHookA
GetWindowDC
EnumDisplayDevicesA
GetQueueStatus
DefWindowProcA
EnableScrollBar
SetThreadDesktop
GetCursor
GetCursorFrameInfo
SendInput
GetLastInputInfo
SetMessageExtraInfo
GetLastInputInfo
InSendMessage
MessageBoxIndirectA
AdjustWindowRectEx
DefWindowProcA
CalcMenuBar
MessageBoxTimeoutW
InvalidateRect
GetRawInputDeviceList
CopyImage
MapDialogRect
SetPropA
GetPropA
CreateAcceleratorTableA
CascadeWindows
OffsetRect
FindWindowA
SendMessageTimeoutA
EditWndProc
GetRawInputDeviceInfoA
EditWndProc
GetLastInputInfo
LoadRemoteFonts
MapVirtualKeyExA
EnumDesktopsA
SendMessageTimeoutA
ChangeDisplaySettingsA
CharUpperA
CharLowerBuffA
ScrollWindowEx
advapi32
CredGetTargetInfoA
opengl32
glGetFloatv
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ