Static task
static1
Behavioral task
behavioral1
Sample
efd2d6d123a667bdbeb72d7cfbca39395fd961cd6d818f9ef9dc9bde23145425.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efd2d6d123a667bdbeb72d7cfbca39395fd961cd6d818f9ef9dc9bde23145425.exe
Resource
win10v2004-20220812-en
General
-
Target
efd2d6d123a667bdbeb72d7cfbca39395fd961cd6d818f9ef9dc9bde23145425
-
Size
682KB
-
MD5
4744de32dd91f072c8101fd1c5c1c830
-
SHA1
8ac707084a8726049080302e1d5b068dd539a551
-
SHA256
efd2d6d123a667bdbeb72d7cfbca39395fd961cd6d818f9ef9dc9bde23145425
-
SHA512
d8dec1e873f0511c533fb883fab8c495dee9de0c0817d6c527de4f67ae803c859972016dd4e7c95c3db8cbb5a6b5f04aaccb48ffae88d968b15fa7cf5c6355e9
-
SSDEEP
12288:CzNsvG/6sSBBUqyHpDKv3S+TiKUI2IvyY8Qb:CzNsvG/6ZUDHpDKv3xTPUbIGA
Malware Config
Signatures
Files
-
efd2d6d123a667bdbeb72d7cfbca39395fd961cd6d818f9ef9dc9bde23145425.exe windows x86
3128951df3a12cbfdb8e4540c6828c00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
EnterCriticalSection
GetTempFileNameW
GetCurrentProcess
GetModuleFileNameW
GetFileAttributesW
MulDiv
LeaveCriticalSection
FlushInstructionCache
RaiseException
GetLastError
FormatMessageW
DeleteFileW
LocalFree
SetLastError
WaitForSingleObject
CloseHandle
FindFirstFileW
WideCharToMultiByte
FindClose
MapViewOfFileEx
LockResource
LoadResource
GetTickCount
GetPrivateProfileIntW
CreateProcessW
GetPrivateProfileStringW
GetExitCodeProcess
ReadFile
GetProcessHeap
FindResourceExW
SizeofResource
GetFileSize
lstrlenW
GetSystemWindowsDirectoryW
OutputDebugStringW
FindResourceW
HeapFree
UnmapViewOfFile
GetSystemWow64DirectoryW
CreateFileW
FindNextFileW
InterlockedDecrement
lstrcpynW
GetVolumeNameForVolumeMountPointW
GetDiskFreeSpaceExW
GetTempPathW
GetVersionExW
ExpandEnvironmentStringsW
InitializeCriticalSection
FreeLibrary
CreateThread
GetModuleHandleW
DuplicateHandle
Sleep
GetCommandLineW
SetEvent
CreateEventW
OpenProcess
GetProcAddress
LoadLibraryW
DeleteCriticalSection
InterlockedIncrement
GetLocalTime
GetCurrentProcessId
GetFileAttributesExW
GetFullPathNameW
CreateDirectoryW
SetFileTime
DeviceIoControl
SetFileAttributesW
SetFilePointerEx
WriteFile
FlushFileBuffers
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
LoadLibraryA
InterlockedExchange
GetVersionExA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetStartupInfoW
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
GetCPInfo
GetOEMCP
IsValidCodePage
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
CreateFileA
SetEndOfFile
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 392KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ