Static task
static1
Behavioral task
behavioral1
Sample
efb4aaf75023a6e4f59c610827e5f49078cae963768086f6a0b80edd416c5f55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efb4aaf75023a6e4f59c610827e5f49078cae963768086f6a0b80edd416c5f55.exe
Resource
win10v2004-20220812-en
General
-
Target
efb4aaf75023a6e4f59c610827e5f49078cae963768086f6a0b80edd416c5f55
-
Size
448KB
-
MD5
fcc007293267d20376337f1e7e046022
-
SHA1
541e34b92a7db670a1f677b981353e66e2f03ea8
-
SHA256
efb4aaf75023a6e4f59c610827e5f49078cae963768086f6a0b80edd416c5f55
-
SHA512
f78d1743030bc2c5d70552dcb0e91cf9a6a574f17d137aef0d9e944cfd72482b7c2a3b7beb641e94f44be470d08d51e207b9746a6a1cdc0ec26fd6ddda3a89b2
-
SSDEEP
6144:HkG8WPUy3n7/2cWF3N50b3u71OAwhwPFucT1Cyks0xe4O+3VHSQbrIuGI:HPNn7/2cgPy+RL+IFu61IjumSQIuGI
Malware Config
Signatures
Files
-
efb4aaf75023a6e4f59c610827e5f49078cae963768086f6a0b80edd416c5f55.exe windows x86
72d68151ff566f7bcce3f0eae8615d28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetTempPathA
LoadLibraryA
GetFileSize
GlobalFree
LocalAlloc
SetThreadPriority
CreateFileMappingA
WriteFile
GlobalAlloc
Sleep
FindClose
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
GetBinaryTypeA
ResumeThread
CopyFileA
FreeResource
VirtualProtect
GetProcAddress
SetLastError
GetModuleHandleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
SetStdHandle
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapFree
HeapCreate
MapViewOfFile
FlushViewOfFile
GetLastError
CreateFileA
ReadFile
CloseHandle
CreateMutexA
HeapAlloc
VirtualFree
HeapDestroy
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
user32
LoadAcceleratorsA
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
UpdateWindow
LoadCursorA
RegisterClassExA
CopyImage
DrawIcon
GetMessageA
TranslateMessage
DispatchMessageA
LoadStringA
TranslateAcceleratorA
IsWindow
IsWindowVisible
GetDesktopWindow
GetIconInfo
LoadIconA
ReleaseDC
DestroyIcon
CreateDialogParamA
EndDialog
GetDC
gdi32
GetDIBits
GetObjectA
CreateDCA
GetDeviceCaps
SelectObject
Rectangle
DeleteObject
EnumObjects
CreateCompatibleBitmap
ole32
CoCreateInstance
CoUninitialize
pdh
PdhAddCounterA
PdhOpenQueryA
PdhCollectQueryData
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ