Static task
static1
Behavioral task
behavioral1
Sample
ef6b6c04ddbfb433745aac353b47699bfb1bb5a389ad373b776895dce5c33ec2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef6b6c04ddbfb433745aac353b47699bfb1bb5a389ad373b776895dce5c33ec2.exe
Resource
win10v2004-20221111-en
General
-
Target
ef6b6c04ddbfb433745aac353b47699bfb1bb5a389ad373b776895dce5c33ec2
-
Size
170KB
-
MD5
75ebf980a7e64147bbb9f5458bfc0032
-
SHA1
bdd9944eecce5bb4a7937cf15c89c38ac4125b3e
-
SHA256
ef6b6c04ddbfb433745aac353b47699bfb1bb5a389ad373b776895dce5c33ec2
-
SHA512
ac7d959bd1083a7c3cc319cef738a886025b6a76fee2249a4f8ad201e826419e7bcc3329f1339322ff81cfb160a5f01059b3940211ad0522c22b1104dddcee2a
-
SSDEEP
3072:MmJyi9KTKGoEkaIOZnY5lkMkFIVALqp5l83CGKPVvH7f9D4Z:MiDrAylPWIVJ783+PVvH7V+
Malware Config
Signatures
Files
-
ef6b6c04ddbfb433745aac353b47699bfb1bb5a389ad373b776895dce5c33ec2.exe windows x86
616a36f2f377cfa871c9822f8819264e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_CIexp
__p__wcmdln
_fpreset
_wexeclp
wcsncmp
kernel32
CreateDirectoryW
GetProcessHeap
GetModuleHandleA
lstrcatA
ExitProcess
GetCurrentProcess
HeapAlloc
GetStdHandle
VirtualAlloc
GetCommandLineA
VirtualFree
GetCurrentThread
GetDefaultCommConfigW
gdi32
EngCreateSemaphore
GdiSetLastError
GdiGradientFill
CreateFontA
FONTOBJ_cGetAllGlyphHandles
SetArcDirection
SetROP2
RemoveFontResourceW
GdiSetPixelFormat
CreateDiscardableBitmap
EngLockSurface
GetFontLanguageInfo
GetStringBitmapA
GetEnhMetaFileA
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 78KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ