Static task
static1
Behavioral task
behavioral1
Sample
ef9cc8f92889cd3fa71872e9e42b8cff8a55244e34ffc4b094f2fd047d710332.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef9cc8f92889cd3fa71872e9e42b8cff8a55244e34ffc4b094f2fd047d710332.exe
Resource
win10v2004-20220812-en
General
-
Target
ef9cc8f92889cd3fa71872e9e42b8cff8a55244e34ffc4b094f2fd047d710332
-
Size
60KB
-
MD5
7ef870ababc1aef544ab1a12449ed224
-
SHA1
fc423972349e64862c05f001cf7782096281572e
-
SHA256
ef9cc8f92889cd3fa71872e9e42b8cff8a55244e34ffc4b094f2fd047d710332
-
SHA512
4e04be56fc2bc02830273f1af7a38d8118da0d7cebdf5be75130378271bf4cb0660dfe5f6dc9e13b30931ea7fd2682602132287b20d07dd5491dc7b7c1fa99af
-
SSDEEP
1536:DE3WqoQRVwce0mPSnpakPSS7GZvV89cWEPAjXt9:DFqwce0muaGFGZvV89EPAjXz
Malware Config
Signatures
Files
-
ef9cc8f92889cd3fa71872e9e42b8cff8a55244e34ffc4b094f2fd047d710332.exe windows x86
9b7decf7b01793736bcace3fce5bf790
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceStatusEx
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SetEntriesInAclA
SetSecurityInfo
StartServiceA
iphlpapi
SendARP
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeviceIoControl
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FindResourceA
FreeResource
GetAtomNameA
GetComputerNameA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetExitCodeProcess
GetFileSize
GetLastError
GetLogicalDrives
GetLongPathNameA
GetModuleFileNameA
GetShortPathNameA
GetSystemDirectoryA
GetSystemInfo
GetTempPathA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatusEx
InterlockedDecrement
InterlockedIncrement
IsProcessorFeaturePresent
LoadResource
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
OpenThread
ReadFile
ReleaseSemaphore
SetComputerNameA
SetCurrentDirectoryA
SetLastError
SetSystemPowerState
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WinExec
WriteFile
msvcrt
_ltoa
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
_winmajor
_winminor
abort
atexit
atoi
atol
exit
fclose
fopen
fprintf
free
malloc
memcpy
memset
rand
signal
sprintf
srand
strcmp
strcpy
time
shell32
ShellExecuteA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
ExitWindowsEx
FindWindowA
GetMessageA
GetSystemMetrics
GetWindowLongA
LoadCursorA
LoadIconA
LockWorkStation
MessageBoxA
RegisterClassExA
SendMessageA
ShowWindow
TranslateMessage
wsock32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
gethostname
htons
inet_addr
inet_ntoa
listen
ntohs
recv
recvfrom
select
send
sendto
shutdown
socket
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 19KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE