Static task
static1
Behavioral task
behavioral1
Sample
ef92a186f598fc351c1b8c73adac59897346f74693e20184e22cf5a8790e12fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef92a186f598fc351c1b8c73adac59897346f74693e20184e22cf5a8790e12fc.exe
Resource
win10v2004-20220812-en
General
-
Target
ef92a186f598fc351c1b8c73adac59897346f74693e20184e22cf5a8790e12fc
-
Size
241KB
-
MD5
9560e96f4970da7414945afdc61865f3
-
SHA1
5e7e77b730da64af5bc5ceb6e349b0568396f670
-
SHA256
ef92a186f598fc351c1b8c73adac59897346f74693e20184e22cf5a8790e12fc
-
SHA512
9e097f6cb905bdb546a13cc020d096f7ed7e52f3706045062bc40ca29b8ec550b5386922d0d485722e454a6ea769c5e2e55618a27bdb85e1db01d9430b6225cf
-
SSDEEP
3072:X7PBbB4HfmhZOGjzmTfwQaIvDL3UZ50beEPDELg:X75BgfmhQ+SnL3k5WDE
Malware Config
Signatures
Files
-
ef92a186f598fc351c1b8c73adac59897346f74693e20184e22cf5a8790e12fc.exe windows x86
9058607b4021ef3ec141cd81a8ba5f19
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
GlobalFlags
GetThreadTimes
WriteConsoleInputW
FindNextFileW
Thread32Next
ReadConsoleA
Process32First
AddAtomW
Heap32ListFirst
GetBinaryTypeA
WritePrivateProfileSectionW
GetCommMask
ExpandEnvironmentStringsA
SetLocaleInfoW
EscapeCommFunction
EnumTimeFormatsW
CallNamedPipeW
SetConsoleActiveScreenBuffer
GetCommTimeouts
FindCloseChangeNotification
GetBinaryTypeA
SetThreadExecutionState
GetPrivateProfileSectionA
SetNamedPipeHandleState
GetTimeFormatW
GlobalGetAtomNameA
CreateConsoleScreenBuffer
GetProcessAffinityMask
GetProcessShutdownParameters
LocalFlags
SetHandleInformation
Process32First
LocalShrink
CreateHardLinkW
IsBadWritePtr
WritePrivateProfileSectionA
ClearCommBreak
CreatePipe
user32
GetWindowRgn
CreateDialogParamA
RegisterClassExW
PostThreadMessageA
SetWindowsHookW
EnumDisplaySettingsExW
CharPrevW
SetWindowTextA
CallNextHookEx
FindWindowExW
TranslateAcceleratorA
FindWindowA
UpdateWindow
IsZoomed
FindWindowExA
SetProcessWindowStation
WINNLSEnableIME
CreateWindowExA
WINNLSGetEnableStatus
DdeCmpStringHandles
UnhookWindowsHookEx
GetTitleBarInfo
MonitorFromPoint
Sections
.text Size: 223KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.alt Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alt Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE