Static task
static1
Behavioral task
behavioral1
Sample
8d481b9c6dfe59bda008e8b3030f995af0c5453f0828cf12d4211333de2cd5d1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d481b9c6dfe59bda008e8b3030f995af0c5453f0828cf12d4211333de2cd5d1.exe
Resource
win10v2004-20220812-en
General
-
Target
8d481b9c6dfe59bda008e8b3030f995af0c5453f0828cf12d4211333de2cd5d1
-
Size
464KB
-
MD5
6bf9d64b674bbce779992e49dcce06e0
-
SHA1
34cc8e06f69305c444b00b07272471a0c534d942
-
SHA256
8d481b9c6dfe59bda008e8b3030f995af0c5453f0828cf12d4211333de2cd5d1
-
SHA512
ac80e7046f4d8056f06be08c9e6657c0c92474be358d5a79d4d1d475fb93945d5f56720e066eb32a7eb0a0954b37f673d1e54294a831e5e073694932bf3e11d6
-
SSDEEP
6144:q+mjKNCwv0TS9a9XbIguRxyQlTgALXqo1jmUZxL6xQGQgg:VmjKNCHr9XEFPZNLXqs76P
Malware Config
Signatures
Files
-
8d481b9c6dfe59bda008e8b3030f995af0c5453f0828cf12d4211333de2cd5d1.exe windows x86
28f4b0030bba30591c1b0b98e7db024d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
GetTempFileNameW
GetVersionExW
SystemTimeToFileTime
GetTickCount
GetDriveTypeW
FreeLibrary
GetLocalTime
LoadLibraryW
GetProcAddress
GetCommandLineW
SetFileAttributesW
WritePrivateProfileStringW
GetCurrentProcess
GetThreadSelectorEntry
ReadProcessMemory
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
VirtualQueryEx
GetModuleFileNameW
GetModuleFileNameA
CreateFileA
VirtualQuery
DeviceIoControl
UnmapViewOfFile
IsDBCSLeadByte
GetCPInfo
MapViewOfFileEx
CreateFileMappingW
OpenFileMappingW
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
MoveFileW
GetSystemTimeAsFileTime
WriteFile
SetFilePointer
Sleep
ReadFile
LoadResource
FindFirstFileW
SizeofResource
lstrlenW
CreateFileW
GetFileSize
FindResourceExW
CloseHandle
MultiByteToWideChar
FindNextFileW
FindClose
SetLastError
FindResourceW
GetFullPathNameW
MoveFileExW
DeleteFileW
LockResource
GetLastError
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetCurrentDirectoryA
LoadLibraryA
GetDriveTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStdHandle
SetStdHandle
GetLocaleInfoW
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetDateFormatA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
CreateDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetStartupInfoW
RtlUnwind
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
GetTimeFormatA
user32
GetMonitorInfoW
GetCursorPos
MonitorFromPoint
UnregisterClassA
advapi32
IsTextUnicode
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetFolderPathW
ole32
StringFromGUID2
CoCreateGuid
CoUninitialize
CoInitialize
shlwapi
PathFileExistsW
netapi32
NetWkstaTransportEnum
NetApiBufferFree
Netbios
ws2_32
sendto
WSACleanup
socket
htons
closesocket
WSAStartup
gethostbyname
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 204KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE