Static task
static1
Behavioral task
behavioral1
Sample
8a4929b9ae601a47fb70614169a2f89e5fb0222027ed44f528d8f8f10c703af6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a4929b9ae601a47fb70614169a2f89e5fb0222027ed44f528d8f8f10c703af6.exe
Resource
win10v2004-20220812-en
General
-
Target
8a4929b9ae601a47fb70614169a2f89e5fb0222027ed44f528d8f8f10c703af6
-
Size
321KB
-
MD5
72a8981c4d3406dee0c4b3e97f850990
-
SHA1
80875eeed97fc6cf05e1df86ad535a73a3d4ffef
-
SHA256
8a4929b9ae601a47fb70614169a2f89e5fb0222027ed44f528d8f8f10c703af6
-
SHA512
691f2f8d94cb0da6d29ddf38832e5f9b53f1e2396f1d6c07c48e9d5a72e77d1cf0532c21bbc6664f885dcccce18423759f451381b0dcca6a063ff9047735e6f5
-
SSDEEP
6144:KbOUMYSPhttXgwZHspa1QuJwrXzz8DlPxrDh8fRLsaHnelLhU4:/ULSlw+H+zz8h53hoRL1H6hU4
Malware Config
Signatures
Files
-
8a4929b9ae601a47fb70614169a2f89e5fb0222027ed44f528d8f8f10c703af6.exe windows x86
3662d4653376ca017ef69ec4b40d2db9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetStdHandle
GetOEMCP
LCMapStringW
lstrlenW
HeapFree
GetDateFormatA
ReadFile
FlushFileBuffers
OpenMutexA
CompareStringA
ReadConsoleInputW
CompareStringW
HeapCreate
TlsAlloc
LCMapStringA
HeapDestroy
InitializeCriticalSection
GetCurrentProcessId
TlsSetValue
VirtualFree
FreeEnvironmentStringsW
TerminateProcess
WideCharToMultiByte
VirtualAllocEx
EnterCriticalSection
CopyFileA
WriteProfileStringA
GetProfileSectionA
GetLastError
MultiByteToWideChar
GetModuleFileNameA
GetStringTypeW
VirtualQuery
GetCurrencyFormatW
GetLocalTime
SetLastError
EnumDateFormatsExA
DeleteCriticalSection
IsBadWritePtr
SetThreadAffinityMask
GetStartupInfoA
GetStringTypeA
GetCurrentThreadId
FindNextFileA
LeaveCriticalSection
RtlUnwind
ExitProcess
WaitForSingleObjectEx
HeapAlloc
GetSystemTimeAsFileTime
LoadLibraryA
SetStdHandle
GetVersion
UnhandledExceptionFilter
GetConsoleMode
SetThreadIdealProcessor
InterlockedExchange
GetSystemTime
InterlockedIncrement
GetDriveTypeW
GetCPInfo
GetConsoleCursorInfo
SetEnvironmentVariableA
GetTimeZoneInformation
GetEnvironmentStringsW
GetCurrentThread
FreeEnvironmentStringsA
GetFullPathNameW
GetFileAttributesExW
VirtualAlloc
GetEnvironmentStrings
WriteFile
TlsGetValue
GetTempFileNameA
SetConsoleActiveScreenBuffer
CreateMutexA
HeapReAlloc
CloseHandle
GetACP
GetCommandLineA
TlsFree
GetTickCount
EnumResourceTypesA
SetFilePointer
GetCurrentProcess
GetProcAddress
GetModuleHandleA
SetHandleCount
QueryPerformanceCounter
InterlockedDecrement
comctl32
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_DragLeave
CreatePropertySheetPageA
ImageList_LoadImageA
CreatePropertySheetPage
ImageList_AddMasked
ImageList_SetDragCursorImage
ImageList_Draw
ImageList_Add
DrawStatusTextW
ImageList_LoadImageW
ImageList_BeginDrag
DrawStatusText
shell32
SHBrowseForFolder
DragQueryFileA
user32
RegisterClassA
EqualRect
RegisterClassExA
comdlg32
GetSaveFileNameW
ChooseColorA
ChooseColorW
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ