Static task
static1
Behavioral task
behavioral1
Sample
ef9e423775fdecc7ce2d4abf09616b22728ae64ac55792f7d808e1bfda7eca8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef9e423775fdecc7ce2d4abf09616b22728ae64ac55792f7d808e1bfda7eca8d.exe
Resource
win10v2004-20220901-en
General
-
Target
ef9e423775fdecc7ce2d4abf09616b22728ae64ac55792f7d808e1bfda7eca8d
-
Size
320KB
-
MD5
c0db7d758f945006842a69f1fde4f856
-
SHA1
ec79eb0b47444b022f5a36242394c16a60c0eb2e
-
SHA256
ef9e423775fdecc7ce2d4abf09616b22728ae64ac55792f7d808e1bfda7eca8d
-
SHA512
58c97c76384a19368166b05c6e2de95e4c1db9410daed8844c8129621ed4e130affce5610df8bf8f74daf4d1a62fb67bdcd3bbc287c10673c622085139c397ec
-
SSDEEP
6144:U6V/6+eFrhyeGBotp/c5UgAfI2ePFhPz7/OE/7W:U6V/3eFrhdGitp/c5UPfI1dhPz7p
Malware Config
Signatures
Files
-
ef9e423775fdecc7ce2d4abf09616b22728ae64ac55792f7d808e1bfda7eca8d.exe windows x86
14eeec7b4fd05c080097ea8757e52c29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
RaiseException
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapAlloc
GetProfileStringA
HeapFree
GetCommandLineA
GetStartupInfoA
RtlUnwind
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetShortPathNameA
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
DuplicateHandle
GetOEMCP
GetCPInfo
GetProcessVersion
GetCurrentDirectoryA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
FormatMessageA
LocalFree
SetLastError
GetThreadLocale
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
MulDiv
MultiByteToWideChar
GetLastError
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
lstrcpynA
GetFileAttributesA
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GetProcAddress
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
lstrcmpA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
lstrlenA
CreateEventW
GetCurrentThreadId
OpenMutexW
CreateMutexW
WinExec
ExitProcess
GetCommandLineW
GetTickCount
GetSystemDirectoryW
MoveFileExW
GetTempPathW
CreateDirectoryW
CopyFileW
GetCurrentProcess
FindFirstFileW
FindNextFileW
CreateFileW
GetFileSize
ReadFile
Sleep
OpenProcess
CreateFileA
VirtualAlloc
ReadProcessMemory
VirtualFree
CloseHandle
TerminateProcess
GetModuleFileNameW
SetFileAttributesW
DeleteFileW
GetModuleFileNameA
HeapCreate
user32
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
InvalidateRect
PtInRect
FillRect
SetRect
GetDC
LoadCursorA
DestroyCursor
LoadIconA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
MapDialogRect
GetWindow
SetWindowContextHelpId
wsprintfA
SetFocus
ShowWindow
SetWindowPos
ReleaseCapture
KillTimer
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
InflateRect
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
MessageBoxA
SetCursor
UpdateWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
MoveWindow
GetDesktopWindow
ShowOwnedPopups
PostQuitMessage
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
IsWindowVisible
OpenClipboard
EmptyClipboard
CloseClipboard
GetInputState
PostThreadMessageA
GetMessageA
PostMessageA
SendMessageA
wsprintfW
GetClientRect
EnableWindow
SetParent
SetCapture
LockWindowUpdate
GetDCEx
SetWindowLongA
FindWindowW
GetSystemMetrics
RegisterClipboardFormatA
SetTimer
GetTabbedTextExtentA
FindWindowA
CharUpperA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
DestroyIcon
LoadStringA
GetSysColorBrush
DeleteMenu
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetClassNameA
GetMenuStringA
InsertMenuA
IsZoomed
CharNextA
BringWindowToTop
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadMenuA
ModifyMenuA
WindowFromPoint
GetDlgCtrlID
DestroyMenu
ReleaseDC
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
GetCharWidthA
CreateFontIndirectA
SaveDC
RestoreDC
SetBkMode
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
GetCurrentPositionEx
StretchDIBits
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
LPtoDP
GetNearestColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetWindowOrgEx
GetMapMode
SetRectRgn
CombineRgn
CreateRectRgnIndirect
BitBlt
GetTextMetricsA
SelectObject
GetTextExtentPoint32A
GetBkColor
GetTextColor
DeleteDC
CreateDCA
SetAbortProc
StartDocA
StartPage
EndPage
EndDoc
AbortDoc
GetViewportOrgEx
CreatePen
DPtoLP
Rectangle
GetStockObject
PatBlt
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
CreateBitmap
comdlg32
PrintDlgA
GetFileTitleA
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
CheckTokenMembership
FreeSid
RegDeleteValueW
RegOpenKeyExW
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExW
RegSetValueExW
shell32
DragFinish
ExtractIconA
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFileInfoA
DragQueryFileA
comctl32
ord17
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
SysAllocStringLen
VariantChangeType
VariantClear
SysAllocString
VariantTimeToSystemTime
VariantCopy
SysStringLen
SysAllocStringByteLen
SysFreeString
psapi
GetModuleFileNameExW
EnumProcesses
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ