Static task
static1
Behavioral task
behavioral1
Sample
8e9cc40d548f3c3b2dbfaf8ad54d139a54a0662f3dd4435aa39e39de6d9d828f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e9cc40d548f3c3b2dbfaf8ad54d139a54a0662f3dd4435aa39e39de6d9d828f.exe
Resource
win10v2004-20220812-en
General
-
Target
8e9cc40d548f3c3b2dbfaf8ad54d139a54a0662f3dd4435aa39e39de6d9d828f
-
Size
1.9MB
-
MD5
daf755e0ceccc2495772f7c26c07d4cc
-
SHA1
78782306aab68b388ff84a809c229e883d1e2dad
-
SHA256
8e9cc40d548f3c3b2dbfaf8ad54d139a54a0662f3dd4435aa39e39de6d9d828f
-
SHA512
33a41def1c5f120ebc229e47a8cff519b954461ebb26beff874e51bd1f2596423721e2149d7c2c17f599a11a0d1ec8ce541bed9ae402eba62783c908c2619153
-
SSDEEP
49152:QP+pSpC2hED3+ams/dikRxd7hiYAnJqgs7a3m0VppIwCHDh:QPIv1iE7VoHVpOjV
Malware Config
Signatures
Files
-
8e9cc40d548f3c3b2dbfaf8ad54d139a54a0662f3dd4435aa39e39de6d9d828f.exe windows x86
db108498d7dad4fcab9ec779878dfd03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
GlobalAddAtomW
GlobalFlags
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalFindAtomW
FlushFileBuffers
RtlUnwind
ExitProcess
TerminateProcess
HeapAlloc
HeapFree
GetCommandLineA
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
SetErrorMode
lstrcatW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
RaiseException
GetCurrentThread
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GetProcAddress
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
SetLastError
GlobalFree
lstrcpyW
lstrlenW
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
lstrcpynW
LocalFree
SetFileTime
GetCurrentDirectoryW
CreateDirectoryW
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
GetCurrentProcess
DuplicateHandle
GetFileType
MultiByteToWideChar
GetModuleFileNameW
GetWindowsDirectoryW
GetLocaleInfoA
GetACP
InterlockedExchange
GetCommandLineW
GetModuleHandleW
CreateProcessW
MoveFileExW
DeleteFileW
GetLastError
GetLocalTime
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
WideCharToMultiByte
CreateThread
InitializeCriticalSection
EnterCriticalSection
Sleep
LeaveCriticalSection
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
OutputDebugStringW
FindResourceW
LoadResource
SizeofResource
LockResource
CreateFileW
WriteFile
VirtualQuery
CloseHandle
user32
WinHelpW
GetCapture
CreateWindowExW
GetClassInfoExW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconW
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoW
RegisterClassW
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
RegisterWindowMessageW
SetWindowLongW
GetDlgItem
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextW
GetClassNameW
SetMenuItemBitmaps
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
ShowWindow
DestroyMenu
GetCursorPos
ValidateRect
GetWindowTextW
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassW
PostMessageW
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBoxW
wsprintfW
gdi32
DeleteDC
GetStockObject
ExtTextOutW
TextOutW
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
Escape
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetValueExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
shell32
ord165
SHGetFolderPathW
comctl32
ord17
shlwapi
PathFindFileNameW
PathFileExistsW
PathFindExtensionW
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ