?ahzkkrR_Z@@UGPAGPANM@Z
Static task
static1
Behavioral task
behavioral1
Sample
eef0e8abeb16655aa2436fdcc319ac4d1ef6ad39523915eae5564d5495ee4ec3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eef0e8abeb16655aa2436fdcc319ac4d1ef6ad39523915eae5564d5495ee4ec3.exe
Resource
win10v2004-20221111-en
General
-
Target
eef0e8abeb16655aa2436fdcc319ac4d1ef6ad39523915eae5564d5495ee4ec3
-
Size
138KB
-
MD5
cf6efb581e07645e9655692bcc08348c
-
SHA1
347ea4fdb50226b3cbd34c9c157219f19592496e
-
SHA256
eef0e8abeb16655aa2436fdcc319ac4d1ef6ad39523915eae5564d5495ee4ec3
-
SHA512
062436edde7c0bfb8c6ae92b773b9b6899b158df1c592514ecbb02e9ec47f5886eb9875af5b4fb1bb962f6ba5bb33b5368d3883f04c5bc40d762121bf1aa619a
-
SSDEEP
3072:TipVufIp4owaxmMwGT4m1X2sWPwij1TUQQzpUyF85lywYgDPyiz:TOVYncn1hKyQXM85lzYgOiz
Malware Config
Signatures
Files
-
eef0e8abeb16655aa2436fdcc319ac4d1ef6ad39523915eae5564d5495ee4ec3.exe windows x86
a714feda0a73bc2c19d840c4fc4fdb21
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrTrimA
kernel32
FindNextFileA
CreateNamedPipeA
GetComputerNameW
lstrcmpA
SetCommState
GetTickCount
WaitForSingleObjectEx
InitializeCriticalSection
FoldStringW
CopyFileA
GetSystemDirectoryW
SetThreadExecutionState
GetFileType
SetHandleCount
msvcrt
exit
user32
SwitchToThisWindow
GetDCEx
GetMenuItemInfoW
ToUnicodeEx
CharNextExA
SetTimer
GetLastActivePopup
LoadStringW
IsRectEmpty
GetDlgItemTextA
GetTopWindow
RedrawWindow
LockWindowUpdate
GetDlgItem
CopyAcceleratorTableW
GetMenuItemCount
LoadImageW
LoadAcceleratorsA
LoadImageA
SetWindowLongW
GetPropW
LoadAcceleratorsW
CharLowerA
CreateAcceleratorTableW
InvalidateRgn
OffsetRect
SetScrollInfo
RegisterClassW
CharUpperA
mouse_event
comdlg32
GetSaveFileNameW
PrintDlgW
CommDlgExtendedError
gdi32
CreateBitmapIndirect
RealizePalette
SetBitmapBits
SelectObject
UnrealizeObject
CreateCompatibleDC
GetDeviceCaps
SetBkMode
GetTextFaceW
ExtFloodFill
CreateHatchBrush
PtVisible
EnumFontsW
Exports
Exports
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 237B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp1 Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tmp3 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp4 Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tsc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ