Static task
static1
Behavioral task
behavioral1
Sample
8ab4a00839e3904ee8a9bcf7bb660d9dcfb089070fa0f0002a6a8e09d8cc39ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ab4a00839e3904ee8a9bcf7bb660d9dcfb089070fa0f0002a6a8e09d8cc39ed.exe
Resource
win10v2004-20220812-en
General
-
Target
8ab4a00839e3904ee8a9bcf7bb660d9dcfb089070fa0f0002a6a8e09d8cc39ed
-
Size
18KB
-
MD5
678896954ad43a81acc39f3bd9288710
-
SHA1
8a5fc740e9210d4425ce44115ce0d437b837b794
-
SHA256
8ab4a00839e3904ee8a9bcf7bb660d9dcfb089070fa0f0002a6a8e09d8cc39ed
-
SHA512
ca92891a77652d50b039c4bc9e99809d80adcce67f4ff78825112c4328a1945109696556b3c2234ea1223bfa4bc88ce1158d61f74ef3d608714355d340042c5d
-
SSDEEP
384:iQgXCqjNVwFS9sJOMH8gPCwgeutuqU719tKW61c6dw:NgXCDFX4MH8gPCHJcl7RKW8g
Malware Config
Signatures
Files
-
8ab4a00839e3904ee8a9bcf7bb660d9dcfb089070fa0f0002a6a8e09d8cc39ed.exe windows x86
82631ea39a56836fce243475dfaf847c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
Sleep
SetProcessWorkingSetSize
GetCurrentProcess
lstrcpyA
lstrcatA
GetSystemDirectoryA
CreateProcessA
GlobalMemoryStatusEx
GetTickCount
GetSystemDefaultUILanguage
CreateThread
CloseHandle
WaitForSingleObject
GetModuleHandleA
GetLastError
RaiseException
LoadLibraryA
GetSystemInfo
GetProcAddress
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
user32
wsprintfA
advapi32
RegCloseKey
RegQueryValueExA
iphlpapi
GetIfTable
msvcrt
strlen
strcpy
??3@YAXPAX@Z
strrchr
memcpy
free
malloc
sprintf
strstr
strcat
__CxxFrameHandler
_CxxThrowException
localtime
time
atoi
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
memset
rand
??2@YAPAXI@Z
Sections
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�ŵ����� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE