Static task
static1
Behavioral task
behavioral1
Sample
8280353823638f1d64bea28332631a820e53adfa36cada324f6ed7b97637a9b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8280353823638f1d64bea28332631a820e53adfa36cada324f6ed7b97637a9b9.exe
Resource
win10v2004-20220812-en
General
-
Target
8280353823638f1d64bea28332631a820e53adfa36cada324f6ed7b97637a9b9
-
Size
289KB
-
MD5
7c68de807d6ceafce4ebc43bc781c429
-
SHA1
339ed191528a114cbbaba58c49df8d0c3e193291
-
SHA256
8280353823638f1d64bea28332631a820e53adfa36cada324f6ed7b97637a9b9
-
SHA512
126ab19aed3195d477bc224c048703058686617427a47d1823eb91b4208bbe92497dbd5c245df2915013770732577e7556fb04a5edb759fb5c11b1035b74d531
-
SSDEEP
6144:kz5X72QlgynEsKfanPoIAdhRSbGqgSbGqnSbGqMy:kz5XSQ3oyP1AdhRS6SVS
Malware Config
Signatures
Files
-
8280353823638f1d64bea28332631a820e53adfa36cada324f6ed7b97637a9b9.exe windows x86
4de3ba5e4c79b0aca2a59583ac1c702b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
CreateDirectoryW
CreateFileW
CreateProcessW
DeleteAtom
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExpandEnvironmentStringsW
FindAtomW
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageW
FreeLibrary
GetAtomNameW
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesW
GetFileSize
GetFileTime
GetFullPathNameW
GetLastError
GetLocaleInfoW
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
CloseHandle
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
MulDiv
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadFile
SetCurrentDirectoryW
SetLastError
SetProcessWorkingSetSize
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualFree
VirtualProtect
VirtualQuery
WriteFile
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
AddAtomW
VirtualAlloc
GlobalLock
GetDriveTypeA
user32
LoadIconA
LoadCursorA
GetSystemMetrics
LoadIconW
gdi32
GetStockObject
advapi32
RegOpenKeyExW
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ