Static task
static1
Behavioral task
behavioral1
Sample
8fb546b0960b5ae01589c91f37bf6756fbf15cec37cda42ca7c6ad3e2066f3d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8fb546b0960b5ae01589c91f37bf6756fbf15cec37cda42ca7c6ad3e2066f3d7.exe
Resource
win10v2004-20220812-en
General
-
Target
8fb546b0960b5ae01589c91f37bf6756fbf15cec37cda42ca7c6ad3e2066f3d7
-
Size
329KB
-
MD5
6baa3de7b8938d134fbdf16e6c87332f
-
SHA1
421f7d3146af3b85715beba1dfa7aeb40b2d6c1e
-
SHA256
8fb546b0960b5ae01589c91f37bf6756fbf15cec37cda42ca7c6ad3e2066f3d7
-
SHA512
450efe6578146e982cad8079ad18ff9545a70a6153fcf4133d012ae7896154da497297caea6064214a8e0f6970ba53bdbb9bc889168b08e441b2df0783e3770f
-
SSDEEP
6144:Kp97ZSn0PLGzevIpgGM7KVaUvFxJDpV8n90F+gbnANlr:q97ZSNOIpgN2dDpV8mF+gbAN
Malware Config
Signatures
Files
-
8fb546b0960b5ae01589c91f37bf6756fbf15cec37cda42ca7c6ad3e2066f3d7.exe windows x86
530bb86a27e65587add3dff9951eda4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetCapture
SetClipboardData
SetClipboardViewer
SetCursor
SetDlgItemInt
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenu
SetMenuDefaultItem
SetMenuItemInfoW
SetParent
SetPropW
SetRect
SetRectEmpty
SetScrollInfo
SetScrollPos
SetActiveWindow
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TrackPopupMenuEx
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateLayeredWindow
UpdateWindow
WindowFromPoint
SendMessageW
ScreenToClient
RemovePropW
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterClipboardFormatW
RegisterClassExW
RedrawWindow
PtInRect
PostQuitMessage
PostMessageW
PeekMessageW
PeekMessageA
OpenClipboard
OffsetRect
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MoveWindow
MonitorFromWindow
MonitorFromRect
MonitorFromPoint
ModifyMenuW
MessageBoxW
MessageBeep
MapWindowPoints
LoadStringW
LoadStringA
LoadMenuW
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
LoadAcceleratorsW
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsMenu
IsIconic
IsChild
InvalidateRgn
InvalidateRect
IntersectRect
InsertMenuItemW
InflateRect
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetWindow
GetUpdateRect
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropW
GetParent
GetMonitorInfoW
GetMessageW
GetMessagePos
GetMenuItemInfoW
GetMenuItemID
GetMenuItemCount
GetMenu
GetKeyState
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItemTextW
GetDlgItemInt
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameW
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowW
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumChildWindows
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextW
DrawStateW
DrawIconEx
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DialogBoxParamW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DestroyAcceleratorTable
DeferWindowPos
DefWindowProcW
CreateWindowExW
CreatePopupMenu
CreateDialogParamW
CreateAcceleratorTableW
CopyRect
CopyAcceleratorTableW
ClientToScreen
CloseClipboard
CheckMenuItem
CheckDlgButton
CharUpperW
CharNextW
CharLowerW
ChangeClipboardChain
CallWindowProcW
CallNextHookEx
BringWindowToTop
BeginPaint
BeginDeferWindowPos
AppendMenuW
AllowSetForegroundWindow
SetTimer
AdjustWindowRectEx
shell32
SHBrowseForFolderW
CommandLineToArgvW
ShellExecuteW
SHGetPathFromIDListW
SHGetFolderPathW
SHGetFileInfoW
kernel32
GlobalFree
CloseHandle
WaitForSingleObject
WaitForMultipleObjectsEx
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
UnhandledExceptionFilter
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateThread
TerminateProcess
SystemTimeToFileTime
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetPriorityClass
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
RtlZeroMemory
RtlUnwind
ResumeThread
ResetEvent
ReleaseMutex
ReadFileEx
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
PeekNamedPipe
OpenProcess
OpenFileMappingW
OpenEventA
MultiByteToWideChar
MulDiv
Module32FirstW
MapViewOfFile
LockResource
LocalReAlloc
LocalFree
LocalAlloc
LoadResource
LoadLibraryW
LoadLibraryExW
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
IsDebuggerPresent
IsDBCSLeadByte
IsBadHugeWritePtr
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapDestroy
HeapAlloc
CompareFileTime
GlobalAlloc
GetVersionExW
GetVersionExA
GetUserDefaultLCID
GetTimeFormatA
GetTickCount
GetTempPathA
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetSystemDirectoryW
GetSystemDirectoryA
GetSystemDefaultLCID
GetStringTypeExA
GetStartupInfoA
GetProcessPriorityBoost
GetProcessHeap
GetProcAddress
GetPriorityClass
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocalTime
GetLastError
GetFileAttributesW
GetFileAttributesA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineW
GetAtomNameW
FreeResource
FreeLibrary
FormatMessageW
FlushInstructionCache
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
EnterCriticalSection
DeleteCriticalSection
DebugBreak
CreateThread
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryA
BindIoCompletionCallback
shlwapi
AssocQueryStringW
PathCreateFromUrlW
advapi32
TraceEvent
ReportEventW
RegisterTraceGuidsA
RegisterEventSourceW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
RegCloseKey
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
DeregisterEventSource
UnregisterTraceGuids
ole32
CoRegisterMessageFilter
CreateBindCtx
CoCreateInstance
Sections
.text Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ