Static task
static1
Behavioral task
behavioral1
Sample
8d3f47fd25c5e82ce5c7078879b384a73d5f62a724d1253a9f367cc1fc57db6f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d3f47fd25c5e82ce5c7078879b384a73d5f62a724d1253a9f367cc1fc57db6f.exe
Resource
win10v2004-20220812-en
General
-
Target
8d3f47fd25c5e82ce5c7078879b384a73d5f62a724d1253a9f367cc1fc57db6f
-
Size
308KB
-
MD5
6ba19bb0b96e931813304cd07384cd70
-
SHA1
092b8ea7505df4442f6ec52c5dade2e0aac24755
-
SHA256
8d3f47fd25c5e82ce5c7078879b384a73d5f62a724d1253a9f367cc1fc57db6f
-
SHA512
12200a5bca25295976785bed176e5d75d3030b9c18b7f196c563d5bbc212816c059e138ae258bff0d06baab3ce09a0794c1c21f711d1e777433871657e572ab9
-
SSDEEP
6144:IpiTjEB5iCxTb8qUNIwaNmg8+1bF4MrRl+Gbtjv:XCxTVUNmm0bFfn/tjv
Malware Config
Signatures
Files
-
8d3f47fd25c5e82ce5c7078879b384a73d5f62a724d1253a9f367cc1fc57db6f.exe windows x86
025ce7eaee0691b6344356a0d3ebb207
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetErrorMode
lstrlenA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FormatMessageW
LocalFree
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
MulDiv
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomW
GlobalUnlock
FreeResource
lstrlenW
WritePrivateProfileStringW
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
DeleteFileW
CloseHandle
GetExitCodeProcess
Sleep
CreateProcessW
GetStartupInfoW
GlobalFree
GetSystemTimeAsFileTime
GetCommandLineW
user32
GetSysColorBrush
LoadCursorW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowRect
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowTextW
SetWindowPos
SetFocus
ShowWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetWindow
UnhookWindowsHookEx
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
DestroyMenu
UnregisterClassW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostQuitMessage
PostMessageW
EnableWindow
KillTimer
DrawIcon
GetClientRect
GetSystemMetrics
SendMessageW
IsIconic
SetTimer
LoadIconW
GetWindowPlacement
UnregisterClassA
gdi32
DeleteDC
TextOutW
GetStockObject
GetDeviceCaps
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateBitmap
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
ExtTextOutW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegDeleteKeyW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetFolderPathW
CommandLineToArgvW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathAppendW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE