Static task
static1
Behavioral task
behavioral1
Sample
de8f2ae7712e48103b29fdee250f36c6a22eecb147b5cf227aa6ad3385ec88fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de8f2ae7712e48103b29fdee250f36c6a22eecb147b5cf227aa6ad3385ec88fe.exe
Resource
win10v2004-20220812-en
General
-
Target
de8f2ae7712e48103b29fdee250f36c6a22eecb147b5cf227aa6ad3385ec88fe
-
Size
118KB
-
MD5
6f18f547bb22d7fb267dc47c9ef170c7
-
SHA1
838b36d14e16d8504b31e0055e0f9e1a17ab30fd
-
SHA256
de8f2ae7712e48103b29fdee250f36c6a22eecb147b5cf227aa6ad3385ec88fe
-
SHA512
9b45be69c0015f63c30a640f30b3a568a66faf3b543adb396cefbec519ad036c9c00ea2cff1749f1f630e210f1b53b87c4e50cefb0f979e3ae8e0a95231abdcf
-
SSDEEP
1536:H22bow0RMLFFem6r5brHmjn/V7Oktx7JDDKSJmbtZVei0ZkRisKldf:H22rJebqxN7J/KSJotZVepk2r
Malware Config
Signatures
Files
-
de8f2ae7712e48103b29fdee250f36c6a22eecb147b5cf227aa6ad3385ec88fe.exe windows x86
4b14e66c9608e121346687283828c146
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
CloseHandle
GetLastError
CreateMutexA
GetProcAddress
LoadLibraryA
FreeLibrary
GetFileAttributesA
CreateProcessA
GetModuleFileNameA
WaitForSingleObject
Sleep
FindClose
FindFirstFileA
CopyFileA
DeleteFileA
MoveFileA
FlushFileBuffers
CreateFileA
OpenProcess
InterlockedDecrement
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
RaiseException
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetLocaleInfoA
InitializeCriticalSection
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
PostMessageA
FindWindowA
GetWindowThreadProcessId
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
shell32
SHGetSpecialFolderPathA
DoEnvironmentSubstA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE