8FfQsJocDF9@8
Static task
static1
Behavioral task
behavioral1
Sample
ef70a1e2430891a707451ab5367764b6bb0aa12b0a712491042780a0232c1ed4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef70a1e2430891a707451ab5367764b6bb0aa12b0a712491042780a0232c1ed4.exe
Resource
win10v2004-20220812-en
General
-
Target
ef70a1e2430891a707451ab5367764b6bb0aa12b0a712491042780a0232c1ed4
-
Size
210KB
-
MD5
8fde1bab9ecff5a2f3b286a9f9058ce7
-
SHA1
4956ac67748c3f4538555b7e0ecf4534e325bb92
-
SHA256
ef70a1e2430891a707451ab5367764b6bb0aa12b0a712491042780a0232c1ed4
-
SHA512
e0c8245cf1bc9144cf363c19f17824619d4ca998e808500da6d395eeebe732ae19285ae355f301440beda724f5ff37b48a8130117bb9786c869d2dc40b83d6ae
-
SSDEEP
3072:LoVqbbWdvd0dLPnJoHCsT10pVW0S3tgAXCQdo:LoVE6dGsT+bS3tdXCQd
Malware Config
Signatures
Files
-
ef70a1e2430891a707451ab5367764b6bb0aa12b0a712491042780a0232c1ed4.exe windows x86
bdfc24c48fe5c802b9f42eaaebb8aaf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
LoadLibraryA
GetVersionExA
GetCommandLineW
GlobalDeleteAtom
GlobalAlloc
VirtualAlloc
ExitProcess
GetModuleHandleA
user32
CreatePopupMenu
GetMenu
AdjustWindowRectEx
ActivateKeyboardLayout
EnableWindow
LoadIconA
CharLowerA
shlwapi
SHDeleteValueA
PathFileExistsA
SHQueryValueExA
SHEnumValueA
SHSetValueA
SHQueryInfoKeyA
ole32
CoReleaseMarshalData
CoGetContextToken
Exports
Exports
Sections
CODE Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 9KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tpdata Size: 512B - Virtual size: 235B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eedata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ