Static task
static1
Behavioral task
behavioral1
Sample
ef818e82cfb94ccf41a9f96ab6d9ee74574dcbb4a0d7bdbae5f1ee252119dc58.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef818e82cfb94ccf41a9f96ab6d9ee74574dcbb4a0d7bdbae5f1ee252119dc58.exe
Resource
win10v2004-20220901-en
General
-
Target
ef818e82cfb94ccf41a9f96ab6d9ee74574dcbb4a0d7bdbae5f1ee252119dc58
-
Size
45KB
-
MD5
345ca3510eb90bf14f05ec9c93af9e5d
-
SHA1
31781605834763857ef53729ce91ce67b5b352fb
-
SHA256
ef818e82cfb94ccf41a9f96ab6d9ee74574dcbb4a0d7bdbae5f1ee252119dc58
-
SHA512
482b053d21c453ec428935b1b1458bfeb1e8c4c172f7088d523d3c33a08b85c3925d694dd112f923b40e1e0f68aa281541ef014811e2abe88235f3ea07486193
-
SSDEEP
768:DLu8TH7pb2JPSr/gF7qVQitYoGUNi7PHxiN7iBswZCZjJ7QDUr9rz3:JbK2yqaAGr5LGwUJ7QDUrBz3
Malware Config
Signatures
Files
-
ef818e82cfb94ccf41a9f96ab6d9ee74574dcbb4a0d7bdbae5f1ee252119dc58.exe windows x86
e0992062021d7b29c910b88579c2cd1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
rasapi32
RasEnumEntriesA
kernel32
GetCurrentThread
GetLocaleInfoW
GetSystemInfo
GetSystemDirectoryA
GetProcessHeap
InitializeCriticalSection
GetVersionExA
GetCurrentThreadId
GetLastError
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
FatalAppExitA
HeapCreate
IsBadWritePtr
GetModuleHandleA
GetCurrentProcess
TlsAlloc
GetStartupInfoA
GetEnvironmentStringsW
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
IsValidCodePage
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetLocalTime
GetProcAddress
cmpbk32
PhoneBookUnload
PhoneBookLoad
PhoneBookGetPhoneDescA
user32
IsMenu
MessageBoxIndirectW
GetClassInfoExW
GetAsyncKeyState
RemoveMenu
UpdateLayeredWindow
SetDlgItemTextA
SetDlgItemTextW
CharUpperW
LoadCursorW
ShowWindow
PeekMessageA
GetKeyboardType
OffsetRect
SetWindowRgn
LoadIconA
OpenClipboard
RegisterClassExW
DestroyCursor
SendMessageW
SetCursorPos
GetDCEx
GetCapture
SetDlgItemInt
MoveWindow
GetCaretPos
EnableWindow
GetClassInfoExA
RegisterClassA
LoadBitmapW
EnumClipboardFormats
GetKeyState
GetIconInfo
DefWindowProcW
ShowCaret
ShowCursor
GetMenuStringW
GetForegroundWindow
GetMessageW
keybd_event
GetDlgItemTextA
RegisterClassW
CharUpperA
GetCursorPos
InvalidateRect
MonitorFromWindow
IsIconic
gdi32
CreateFontIndirectW
GetMetaFileA
CreateFontIndirectExA
CreateBitmapIndirect
CreateICW
SetMetaFileBitsEx
CreatePalette
GetEnhMetaFileA
CreateFontA
CreateRoundRectRgn
mfc42
DllCanUnloadNow
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 9KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 8KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ