Static task
static1
Behavioral task
behavioral1
Sample
8d6fb0e923d9059d857f4283dc2e7cf1277e2e41dec3753e41ded392c685469c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d6fb0e923d9059d857f4283dc2e7cf1277e2e41dec3753e41ded392c685469c.exe
Resource
win10v2004-20220901-en
General
-
Target
8d6fb0e923d9059d857f4283dc2e7cf1277e2e41dec3753e41ded392c685469c
-
Size
496KB
-
MD5
6f5db2582b93b159844ea729d9f68e30
-
SHA1
e5017a25a2e0069c546de510d04717b233e20b3e
-
SHA256
8d6fb0e923d9059d857f4283dc2e7cf1277e2e41dec3753e41ded392c685469c
-
SHA512
026e00b2e9e4e895d68dc7f384a34a7f66f7be4093dae25555bcbe5594f560a6fb14f3390f4434dc7bcb473a1adbb8ea49931ff02dee9aa62f98bed929c69e29
-
SSDEEP
12288:qYnUw2HQ45q9L7zHzrY+v+SYOxc8YthIOMNvnVn:qfQ45q9THzY3Ot9nl
Malware Config
Signatures
Files
-
8d6fb0e923d9059d857f4283dc2e7cf1277e2e41dec3753e41ded392c685469c.exe windows x86
6a1b6bba42d00544545be831cc2beb92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionW
PathAddBackslashW
PathFindFileNameW
PathFileExistsW
PathIsDirectoryW
kernel32
CreateProcessW
WaitForSingleObject
lstrlenW
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingW
OpenFileMappingW
SetFilePointerEx
WriteFile
ReadFile
CreateFileW
GetFileSizeEx
CreateDirectoryW
GetDateFormatW
GetLocalTime
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
GetPrivateProfileStringW
GetPrivateProfileIntW
GetACP
GetProcAddress
IsValidCodePage
GetLocaleInfoW
GetModuleFileNameW
CreateMutexW
SetLastError
ReleaseMutex
GetCurrentProcess
GetVolumeInformationW
PeekNamedPipe
CloseHandle
WaitNamedPipeW
FlushFileBuffers
FileTimeToSystemTime
GetFileTime
GetFileSize
FileTimeToLocalFileTime
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
WideCharToMultiByte
MultiByteToWideChar
lstrcpynW
lstrcmpW
lstrcatW
GetTempPathW
GetExitCodeThread
FreeLibrary
LoadLibraryW
GetFileAttributesW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
EnterCriticalSection
OpenEventW
CreateEventW
ResetEvent
GetLastError
SetEvent
MoveFileExW
DeleteFileW
lstrcpyW
FindClose
WaitForMultipleObjects
FindFirstFileW
Sleep
FindNextFileW
lstrcmpiW
GetCommandLineW
GetCurrentProcessId
VirtualAlloc
LoadLibraryA
InitializeCriticalSection
LCMapStringA
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetStringTypeW
GetStringTypeA
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
ExitThread
GetCurrentThreadId
CreateThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetStartupInfoW
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
ExitProcess
GetCPInfo
GetOEMCP
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
LCMapStringW
user32
wsprintfW
WaitForInputIdle
SendMessageW
CharUpperW
LoadStringW
IsWindow
DrawTextW
PostMessageW
gdi32
SetStretchBltMode
SetBkMode
SetTextColor
DeleteObject
SelectObject
StretchDIBits
PatBlt
CreateFontW
SetMapMode
comdlg32
GetSaveFileNameW
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
CryptDestroyHash
CryptDecrypt
CryptCreateHash
CryptReleaseContext
CryptDeriveKey
CryptAcquireContextW
CryptHashData
shell32
SHGetFolderPathW
SHFileOperationW
DoEnvironmentSubstW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
vcomp
_vcomp_for_static_simple_init
_vcomp_fork
_vcomp_for_static_end
Sections
.text Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE