Static task
static1
Behavioral task
behavioral1
Sample
8c8610bcab03a54ce72a653f6f5f3fa4b3fec5cd99e1edb26929aa858e859b4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c8610bcab03a54ce72a653f6f5f3fa4b3fec5cd99e1edb26929aa858e859b4b.exe
Resource
win10v2004-20220901-en
General
-
Target
8c8610bcab03a54ce72a653f6f5f3fa4b3fec5cd99e1edb26929aa858e859b4b
-
Size
678KB
-
MD5
7c98cd991e53a39602e45f49fa65b6da
-
SHA1
503f33f5a0ab4b1924d6b72ed910c6770cb59387
-
SHA256
8c8610bcab03a54ce72a653f6f5f3fa4b3fec5cd99e1edb26929aa858e859b4b
-
SHA512
69b175841bc101612c5991ed4619bb4ef1d14cd8d57becb20b5988335a20db3481698db4ce2012791ed58fa8c3f1219eeaa16bd5d667aafc4718a166ca797a7b
-
SSDEEP
12288:Neb0iOtioJbuke+SIZikhxtONYdydEAxZWkXogF36hvVaT9gLIl:Neb0iOIOuUGkhxtONYSE0F36dVamLIl
Malware Config
Signatures
Files
-
8c8610bcab03a54ce72a653f6f5f3fa4b3fec5cd99e1edb26929aa858e859b4b.exe windows x86
0d77988c2863f8d1ce78a662572d06bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetCurrentProcessId
GetVersion
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetTickCount
GetCommandLineA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
VirtualFree
HeapCreate
GetModuleHandleW
GetACP
ReadFile
RaiseException
InterlockedCompareExchange
WideCharToMultiByte
GetCommandLineW
LockResource
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GlobalFree
lstrlenA
UnmapViewOfFile
LCMapStringW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetProcAddress
DuplicateHandle
FindFirstFileW
FindNextFileW
CompareStringW
WaitForMultipleObjects
DeleteFileA
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
SetEvent
HeapFree
GetLocaleInfoA
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
LeaveCriticalSection
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
SetLastError
OutputDebugStringA
FormatMessageA
InterlockedDecrement
FindClose
InitializeCriticalSection
FormatMessageW
LocalFree
FreeLibrary
GetFullPathNameA
GetStringTypeW
HeapReAlloc
WriteFile
InterlockedExchange
GetStringTypeA
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
GetConsoleMode
GetCurrentProcess
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetConsoleOutputCP
GetStdHandle
user32
SetCursor
CallWindowProcA
GetClientRect
SendMessageA
GetFocus
EndDialog
LoadIconA
ScreenToClient
GetSubMenu
SetWindowTextA
SetWindowLongA
SetCapture
GetWindowRect
PostMessageA
SetFocus
PtInRect
CreateWindowExA
GetWindowLongA
RegisterClassA
LoadStringA
EnableWindow
ShowWindow
GetMessageA
DestroyWindow
GetDC
EndPaint
IsWindow
SetWindowPos
Sections
.text Size: 641KB - Virtual size: 964KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ