Static task
static1
Behavioral task
behavioral1
Sample
8f77f9f1124f5dcebec8633fe8f445915be24c0dfb21be1a251ddfdf5c4b0dfd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f77f9f1124f5dcebec8633fe8f445915be24c0dfb21be1a251ddfdf5c4b0dfd.exe
Resource
win10v2004-20220812-en
General
-
Target
8f77f9f1124f5dcebec8633fe8f445915be24c0dfb21be1a251ddfdf5c4b0dfd
-
Size
212KB
-
MD5
8e0ac13acf6ae5a104d8559756f6807d
-
SHA1
bf6e82ebf3124ed13841ccda1ab4f3b2d05951b8
-
SHA256
8f77f9f1124f5dcebec8633fe8f445915be24c0dfb21be1a251ddfdf5c4b0dfd
-
SHA512
cadea10c5e2c0eee449e6faca0b4b9ffbd8493bbaa7cf9c73bb0dc0d59289221816e1ea7982945b1107fcf07266e5bf3941298fe548ca83827ac1eae5e90eefc
-
SSDEEP
3072:6ZtFQanyGHwZkTLiqUlI8T92hnpSa3Cw0Ylg+Cj+zeu3z/ghDr7lR9I1UxvLp3I:A4SiuRpTCwb/Cyau3zohDr7lR9Iu
Malware Config
Signatures
Files
-
8f77f9f1124f5dcebec8633fe8f445915be24c0dfb21be1a251ddfdf5c4b0dfd.exe windows x86
2b5e603f4173c21bed2393e7d53d7f22
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAConnect
WSACancelAsyncRequest
WSASetBlockingHook
WSALookupServiceBeginA
ntohl
ioctlsocket
WSAUnhookBlockingHook
WSALookupServiceNextW
WSAGetServiceClassNameByClassIdW
WSASendDisconnect
WSANtohs
getprotobyname
WSADuplicateSocketA
htonl
WSASetLastError
WSALookupServiceEnd
WSAEnumNameSpaceProvidersA
ole32
ReadFmtUserTypeStg
OleSetContainedObject
CoGetTreatAsClass
OleCreate
CoReleaseServerProcess
StgCreateStorageEx
GetRunningObjectTable
CoCreateInstance
CreateBindCtx
advapi32
GetUserNameA
RegCreateKeyW
CreateProcessAsUserW
RegCreateKeyA
InitializeSecurityDescriptor
RegisterEventSourceA
CryptAcquireContextA
RegRestoreKeyW
AllocateAndInitializeSid
RegQueryInfoKeyW
IsValidSecurityDescriptor
CryptVerifySignatureA
AccessCheckAndAuditAlarmA
RegCreateKeyExA
CreatePrivateObjectSecurity
SetTokenInformation
LookupPrivilegeNameA
QueryServiceObjectSecurity
version
GetFileVersionInfoSizeA
VerQueryValueA
VerFindFileA
shell32
FindExecutableA
gdi32
CopyMetaFileW
GetDIBits
Ellipse
SetBitmapDimensionEx
GetDCOrgEx
Rectangle
ExcludeClipRect
CreatePatternBrush
SetDIBitsToDevice
GetOutlineTextMetricsA
StrokePath
GetEnhMetaFileDescriptionA
SetEnhMetaFileBits
kernel32
GetVersion
VirtualQuery
WritePrivateProfileStringW
FreeLibrary
LeaveCriticalSection
GetWindowsDirectoryA
AreFileApisANSI
GlobalAddAtomA
EnumResourceLanguagesW
CreateEventA
IsDBCSLeadByteEx
GetACP
WriteProcessMemory
GetDriveTypeW
RaiseException
lstrcatW
ReleaseMutex
CompareStringW
GetAtomNameA
GetUserDefaultLangID
VirtualLock
GetStartupInfoA
Beep
SetThreadLocale
FindFirstFileExW
GetProfileStringA
LCMapStringA
GetCommModemStatus
FillConsoleOutputCharacterA
GetOEMCP
GlobalFindAtomA
GetModuleHandleA
CancelIo
VirtualAlloc
ReleaseSemaphore
WritePrivateProfileStringA
ReadFileScatter
ConnectNamedPipe
user32
SetLastErrorEx
CharLowerW
GetSysColor
ArrangeIconicWindows
IsCharAlphaNumericA
UnregisterClassA
GetKeyboardLayout
DefWindowProcA
GetKeyboardLayoutNameA
OpenWindowStationW
EnumDisplayDevicesW
ChangeDisplaySettingsW
SetParent
SetDlgItemTextA
CreateCursor
GetMessageW
oleaut32
VariantChangeType
msvcrt
tmpnam
fgetwc
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_i64tow
_snwprintf
_tempnam
mktime
_dup2
_mbsnbcnt
isalpha
_tzset
_chdir
wcsncat
localtime
calloc
wcstombs
vfwprintf
iswprint
_sys_errlist
isprint
_mbslwr
iswctype
_strrev
fprintf
strtol
_wstrdate
_wcsdup
_wfsopen
_wtoi64
isspace
fread
_isctype
_wchdir
_eof
_ultow
_mbctoupper
bsearch
strrchr
_mbstrlen
_cwait
_getpid
_mbscat
_itow
_getdrive
_setmode
strncat
frexp
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE