Static task
static1
Behavioral task
behavioral1
Sample
57efa2c88386baa9970dc748827ca9f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
57efa2c88386baa9970dc748827ca9f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
57efa2c88386baa9970dc748827ca9f0N.exe
-
Size
244KB
-
MD5
57efa2c88386baa9970dc748827ca9f0
-
SHA1
4e087d5289b372e4550b2888d06b5be0d5ed4973
-
SHA256
4fc0f89e188e46d933edce14442c9289bb859d779a0f13c2a7f23c66f1f29015
-
SHA512
05310780fdd625920339eaab9d672f06aa9fe0af50574baaf5cfd6ecbe62966b914db8e95f6ef7d55c29055a4830d5f21d41df1f9822524e668e5177f3465b9d
-
SSDEEP
6144:LEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:sAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
Files
-
57efa2c88386baa9970dc748827ca9f0N.exe.exe windows:4 windows x86 arch:x86
25724a12bec6f765c371201f99ac92be
Code Sign
a0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Signer
Actual PE Digesta0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
SetEvent
FindResourceA
GetExpandedNameW
GetFileTime
RaiseException
GetTempPathW
FileTimeToDosDateTime
GetStringTypeA
SearchPathW
GetTempPathA
GetFileAttributesW
SetCalendarInfoA
GetVersion
CreateMailslotW
lstrlenA
EnumTimeFormatsW
VirtualAlloc
EnumCalendarInfoA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
ConnectNamedPipe
GetModuleFileNameW
lstrcpynA
GetCurrentThread
WaitForSingleObject
GlobalGetAtomNameA
OpenFile
GetTempFileNameW
ReplaceFileA
OpenMutexW
CreateDirectoryA
AddAtomW
GetCurrentProcessId
GetStringTypeW
OpenMutexA
GetLongPathNameA
CreateFiber
GetCurrentDirectoryW
CreateEventA
SystemTimeToFileTime
GlobalDeleteAtom
InitializeCriticalSection
SuspendThread
GetDiskFreeSpaceW
GetCurrentThreadId
CreateThread
SetComputerNameW
IsBadStringPtrA
user32
InsertMenuItemW
ChildWindowFromPoint
GetMessageA
GetWindowRgn
DrawTextW
GetDC
IsDlgButtonChecked
GetClassInfoA
LoadCursorA
CreateDialogParamW
CheckRadioButton
SetCursorPos
LoadImageA
SetWindowLongA
LoadMenuIndirectA
SetCapture
CreateMenu
EnableMenuItem
CharNextW
CheckDlgButton
OpenWindowStationA
gdi32
GetColorSpace
DeleteColorSpace
GetKerningPairsA
CreateMetaFileA
ColorCorrectPalette
GetCharWidthI
GetTextExtentExPointW
GetDCOrgEx
EnumFontFamiliesExW
GetClipRgn
GetCharWidth32W
CombineRgn
GetEnhMetaFileDescriptionA
SelectObject
UpdateICMRegKeyA
GetClipBox
CreateDIBPatternBrushPt
GetTextMetricsW
advapi32
IsValidAcl
RegDeleteValueW
RegRestoreKeyA
RegOpenKeyW
ole32
CoGetPSClsid
CoDeactivateObject
OleCreateEx
CLSIDFromProgID
CoGetCallerTID
OleUninitialize
CreateFileMoniker
Sections
.<9;kn% Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.E Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0<+' Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.< Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FpFJb Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.(c1$7 Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ