Static task
static1
Behavioral task
behavioral1
Sample
0c8deec7b2c97f6217a5a59e262adac732750050da4e90a63ea4f0f75f3956ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c8deec7b2c97f6217a5a59e262adac732750050da4e90a63ea4f0f75f3956ab.exe
Resource
win10v2004-20220812-en
General
-
Target
0c8deec7b2c97f6217a5a59e262adac732750050da4e90a63ea4f0f75f3956ab
-
Size
196KB
-
MD5
62a6940d91bdf69777de2363b4487620
-
SHA1
39b012c329daf144e78af300b2d7e6aad5fbce7a
-
SHA256
0c8deec7b2c97f6217a5a59e262adac732750050da4e90a63ea4f0f75f3956ab
-
SHA512
4028fdb22bb6067fab97a208c07a1db913300c3427cd7dec45e7d11917a54768dd63eb530f1135eb218b159f12c63bc7ffce6627657dbd8998c42e3d9eb23340
-
SSDEEP
3072:aM65zTN7RH9AvfVV3fpp0dL5qxpubZyejITv9fXFg1:1mTNJ0fb3Bp0dLiobP+v9fVa
Malware Config
Signatures
Files
-
0c8deec7b2c97f6217a5a59e262adac732750050da4e90a63ea4f0f75f3956ab.exe windows x86
559ea2d92c5991a634b8d2ac3b9a7cef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathQuoteSpacesA
PathUnquoteSpacesA
PathAppendA
PathRemoveArgsA
StrRChrA
kernel32
SetEvent
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsA
GetWindowsDirectoryA
WriteFile
InitializeCriticalSection
OpenProcess
FindResourceExA
WideCharToMultiByte
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
TerminateProcess
IsDBCSLeadByte
ReadFile
GetSystemDirectoryA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
lstrcmpiA
GetProcAddress
EnterCriticalSection
GetTempFileNameA
FindClose
LoadLibraryA
GetProcessId
CreateFileMappingA
GetExitCodeThread
WaitForSingleObject
CreateEventW
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
LoadLibraryExA
VirtualProtect
OpenEventW
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
lstrcpyA
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrcpynA
MapViewOfFile
lstrlenA
lstrcmpA
GetProcessHeap
FindResourceA
GetFileSize
CreateFileA
GetComputerNameA
ExitProcess
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
LockResource
HeapFree
HeapAlloc
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapReAlloc
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStringTypeA
GetStringTypeW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
user32
PostMessageA
GetMessageA
CharNextA
DefWindowProcA
advapi32
StartServiceA
CloseServiceHandle
RegCloseKey
GetUserNameA
QueryServiceConfigA
OpenSCManagerA
QueryServiceStatusEx
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
EnumServicesStatusExA
CreateServiceA
RegSetValueExA
GetTokenInformation
OpenProcessToken
OpenServiceA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoTaskMemRealloc
StringFromGUID2
CoInitialize
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
Sections
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ