Static task
static1
Behavioral task
behavioral1
Sample
8664aff4fdb4bfa6a8cba572d3713b3954f05cdb5cab54a6b63bb419dd09879a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8664aff4fdb4bfa6a8cba572d3713b3954f05cdb5cab54a6b63bb419dd09879a.exe
Resource
win10v2004-20220901-en
General
-
Target
8664aff4fdb4bfa6a8cba572d3713b3954f05cdb5cab54a6b63bb419dd09879a
-
Size
114KB
-
MD5
772ced5642e2b05b0f6889ddad2dfd55
-
SHA1
f58fef68b93bec1078f0cc1a2fe3331519516717
-
SHA256
8664aff4fdb4bfa6a8cba572d3713b3954f05cdb5cab54a6b63bb419dd09879a
-
SHA512
2573a330e71e3cce7e0aabfc70ea7df477eea391cb0e937e9669dc820474ec088ad6974621269000c066b336044bc37d673dafee21b7c3404b2c790d77f275ba
-
SSDEEP
3072:+29R/LO5kWuRH+rNcbLHG2li7LsADaYQ1D:BBObCHUcbJi7L7GYI
Malware Config
Signatures
Files
-
8664aff4fdb4bfa6a8cba572d3713b3954f05cdb5cab54a6b63bb419dd09879a.exe windows x86
823c547bc576d90245ff73b8815d1d24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetEnvironmentStrings
GetSystemTimeAsFileTime
GetStartupInfoW
DeleteFileA
LoadResource
GetVersionExA
GetModuleFileNameA
WritePrivateProfileStringA
IsDebuggerPresent
RaiseException
GetModuleFileNameW
GetFileAttributesA
DeviceIoControl
CreateFileMappingA
GetPrivateProfileStringA
SetCurrentDirectoryA
MoveFileA
GetStringTypeW
GetTempPathA
SetUnhandledExceptionFilter
GetModuleHandleW
SetFileAttributesA
IsBadWritePtr
IsValidCodePage
lstrcmpA
GetConsoleOutputCP
WaitForMultipleObjects
GetModuleHandleA
QueryPerformanceCounter
GetStringTypeA
GetSystemDefaultLCID
IsBadCodePtr
LCMapStringW
GetExitCodeProcess
GetEnvironmentStringsW
GetFileTime
WaitForSingleObject
GetCommandLineW
GetThreadLocale
GetCPInfo
SetFileAttributesW
GetCommandLineA
InterlockedDecrement
GetUserDefaultLangID
FileTimeToLocalFileTime
lstrcmpiA
EnumCalendarInfoA
VirtualProtect
GetSystemTime
msvcrt
__p___initenv
_exit
__set_app_type
_XcptFilter
_adjust_fdiv
_initterm
_controlfp
_except_handler3
__p__commode
__getmainargs
__setusermatherr
__p__fmode
user32
DefWindowProcA
IsWindowEnabled
OemToCharA
GetMenuStringA
SetWindowsHookExA
PtInRect
SetWindowPlacement
GetClassNameA
CreateWindowExA
RedrawWindow
FillRect
MessageBoxA
SetCapture
UnhookWindowsHookEx
RemoveMenu
GetScrollPos
GetMenu
GetDCEx
DestroyIcon
GetFocus
UnregisterClassA
GetKeyState
SetClipboardData
RemovePropA
DispatchMessageA
ReleaseDC
WinHelpA
IsZoomed
CheckMenuItem
GetMenuItemCount
GetWindowLongA
ReleaseCapture
GetTopWindow
GetWindowRect
PostMessageA
RegisterClassA
GetClassInfoA
DeleteMenu
GetKeyboardType
OpenClipboard
EmptyClipboard
GetWindow
GetLastActivePopup
advapi32
CryptHashData
ControlService
OpenSCManagerA
RegCreateKeyA
RegOpenKeyW
RegEnumValueA
RegQueryValueExW
InitializeAcl
GetTokenInformation
OpenThreadToken
RegQueryInfoKeyW
InitiateSystemShutdownA
DeregisterEventSource
RegCreateKeyExW
CheckTokenMembership
CloseServiceHandle
RegDeleteValueW
DeleteService
RegEnumKeyW
CryptReleaseContext
OpenServiceW
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RegCreateKeyExA
AddAccessAllowedAce
OpenProcessToken
CryptGenRandom
InitializeSecurityDescriptor
LookupPrivilegeValueW
IsValidSid
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ