?buildPreference@@YGEUsimulatecorW@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
8cef52968c01c066069de9aa358a7889046d3e1ce738ee0f062bcff4582640df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8cef52968c01c066069de9aa358a7889046d3e1ce738ee0f062bcff4582640df.exe
Resource
win10v2004-20220812-en
General
-
Target
8cef52968c01c066069de9aa358a7889046d3e1ce738ee0f062bcff4582640df
-
Size
155KB
-
MD5
6161d6ded4c6dd7f2a0a7e36a06098a6
-
SHA1
c4fa1b773fc5a8801aadeeda2906f70043cec0d8
-
SHA256
8cef52968c01c066069de9aa358a7889046d3e1ce738ee0f062bcff4582640df
-
SHA512
071574f8407ef25a4fa47bf94bcffd94c6282d9b10ce6f5fd0115265307dd868e8857b4c86ecb2f3d944ba8b41d15823c100ba2412eebb7ba82789647e66e94a
-
SSDEEP
3072:puA+A0IZAXRo2IWj5S1ZD4L9YnVOkwg/AHCP:x95giR4LaA7
Malware Config
Signatures
Files
-
8cef52968c01c066069de9aa358a7889046d3e1ce738ee0f062bcff4582640df.exe windows x86
bdd72bdbf18064893e560e16f690f1d8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Write
CreatePropertySheetPageA
ImageList_LoadImageW
ImageList_AddMasked
ImageList_Remove
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_GetIcon
CreateStatusWindowW
PropertySheetW
CreatePropertySheetPageW
PropertySheetA
ImageList_Create
ImageList_GetIconSize
ImageList_Draw
ImageList_Destroy
ImageList_Read
ImageList_SetIconSize
InitCommonControlsEx
ImageList_GetImageCount
CreateToolbarEx
comdlg32
ChooseFontW
GetOpenFileNameW
GetSaveFileNameW
PrintDlgW
PrintDlgExW
ChooseColorW
CommDlgExtendedError
FindTextW
PageSetupDlgW
ReplaceTextW
GetFileTitleW
GetOpenFileNameA
GetSaveFileNameA
msvcrt
isalpha
kernel32
EnumResourceLanguagesA
GetComputerNameA
IsBadWritePtr
CreateNamedPipeA
CancelIo
GlobalFindAtomW
DeleteFileW
LoadLibraryExW
GetBinaryTypeA
CreatePipe
GetVersionExW
GetStartupInfoA
FileTimeToSystemTime
AddAtomW
SetTimerQueueTimer
GetStartupInfoW
HeapLock
GetCommModemStatus
DisconnectNamedPipe
UnlockFile
CreateMailslotW
GetSystemTimeAsFileTime
CopyFileA
GlobalFree
FlushViewOfFile
MultiByteToWideChar
ReleaseMutex
GlobalMemoryStatus
GetSystemTimeAdjustment
SetCommTimeouts
IsBadStringPtrW
GetComputerNameW
GetFileAttributesA
GetWindowsDirectoryA
GetWindowsDirectoryW
lstrcmpiW
GetUserDefaultLangID
GetCommState
ResumeThread
SetErrorMode
MoveFileA
CreateNamedPipeW
TryEnterCriticalSection
DeviceIoControl
FreeLibrary
FindFirstFileW
LockResource
DeleteCriticalSection
HeapWalk
LoadLibraryA
GlobalAddAtomA
GlobalAddAtomW
GetDateFormatW
QueryPerformanceCounter
CreateFileA
SetupComm
GetExitCodeThread
SetEvent
GetHandleInformation
CloseHandle
LoadResource
GetTempFileNameA
DuplicateHandle
GlobalMemoryStatusEx
GlobalAlloc
GetCurrentDirectoryW
CompareStringW
GetCommTimeouts
OpenEventW
TlsSetValue
OpenFileMappingA
CreateDirectoryA
CreateThread
FindCloseChangeNotification
IsDBCSLeadByte
VirtualFree
CreateFileMappingA
GlobalDeleteAtom
SetCurrentDirectoryW
HeapCreate
GetFileAttributesExA
GetProcAddress
LCMapStringA
LocalAlloc
FindResourceExA
HeapValidate
SizeofResource
DeleteFileA
UnhandledExceptionFilter
lstrcatA
CompareStringA
lstrlenA
GetComputerNameExW
RemoveDirectoryA
GetComputerNameExA
GetUserDefaultUILanguage
SleepEx
MapViewOfFile
TerminateThread
HeapSize
Sleep
SetThreadContext
FoldStringW
OpenFile
CompareFileTime
UnmapViewOfFile
DefineDosDeviceW
GetFileType
CreateFileMappingW
QueryDosDeviceW
CreateEventA
lstrcpyW
CallNamedPipeW
CreateDirectoryW
WinExec
GetThreadLocale
GetBinaryTypeW
GlobalUnlock
lstrcpynA
LocalFree
GetModuleFileNameW
VerifyVersionInfoW
CreateRemoteThread
GetNumberFormatA
GetTimeFormatW
GetThreadPriority
LeaveCriticalSection
SetThreadExecutionState
FindNextFileA
VirtualQuery
lstrcatW
FindFirstFileA
GetSystemDirectoryA
DeleteAtom
FlushFileBuffers
GetStdHandle
lstrcpyA
GetLocalTime
HeapAlloc
GetTimeZoneInformation
GlobalLock
ReleaseSemaphore
SetCommMask
FileTimeToLocalFileTime
GetTempPathA
SetLastError
SetMailslotInfo
SetSystemTimeAdjustment
GetLastError
SearchPathW
GlobalFlags
GlobalSize
LocalSize
SetFileAttributesW
SetThreadLocale
GetStringTypeExW
WaitForSingleObjectEx
GlobalHandle
VirtualProtect
RegisterWaitForSingleObject
SystemTimeToFileTime
InitializeCriticalSection
IsBadReadPtr
CreateEventW
GetLocaleInfoW
GetSystemWindowsDirectoryW
GetSystemDirectoryW
SetCommBreak
MoveFileExW
CreateWaitableTimerW
GetTempPathW
SetThreadPriority
GetCommandLineA
GetFullPathNameA
SuspendThread
CreateSemaphoreA
user32
GetScrollPos
GetDesktopWindow
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cont Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cond Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cone Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 117B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cons Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ