Static task
static1
Behavioral task
behavioral1
Sample
8ff2aceb18d4e749e04e66c6b691b9d1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8ff2aceb18d4e749e04e66c6b691b9d1.exe
Resource
win10v2004-20220812-en
General
-
Target
8ff2aceb18d4e749e04e66c6b691b9d1
-
Size
1.4MB
-
MD5
8ff2aceb18d4e749e04e66c6b691b9d1
-
SHA1
09eb22b3455f60eaaefcff2bda2afe372672e80a
-
SHA256
5d2333c9892b6efa63905140a0d5a68d356b9a50121e4143111d14197a721bcd
-
SHA512
c4e797c80698f1575ef0954039a6b62e39c1163675fd6ba3944bedc6024dd2af0cab8923b4d8493d0e07a36536a0664ef1eb243d33a2544a42ffa137ea336c82
-
SSDEEP
24576:rjhXeF6y8u1FtnN1YNMZQFr8YEM3YqFfr:nnyN1rnvHqr
Malware Config
Signatures
Files
-
8ff2aceb18d4e749e04e66c6b691b9d1.exe windows x86
b144870e3a37e200b228432e9ff61d95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
HeapDestroy
HeapFree
HeapCreate
HeapAlloc
GetProcessHeap
CloseHandle
QueryPerformanceCounter
ReadFile
SetFilePointer
CreateFileA
ExitProcess
GetModuleFileNameA
Sleep
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualFree
IsBadReadPtr
lstrcmpiA
FreeLibrary
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE