Static task
static1
Behavioral task
behavioral1
Sample
f8f03d3c79177ce634728279c7b5bb798651d3937bf405c8d4edba3bf33c180d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8f03d3c79177ce634728279c7b5bb798651d3937bf405c8d4edba3bf33c180d.exe
Resource
win10v2004-20220812-en
General
-
Target
f8f03d3c79177ce634728279c7b5bb798651d3937bf405c8d4edba3bf33c180d
-
Size
109KB
-
MD5
00f63e5e752236e467aacd921610f3ea
-
SHA1
3056d22077005fc7051e1e7dad4482e698548b53
-
SHA256
f8f03d3c79177ce634728279c7b5bb798651d3937bf405c8d4edba3bf33c180d
-
SHA512
b48532797661e54eb37792657209049dfb6562fc4f5e2530cf553659c5a919244597139e90bda095e0ea76b1f112bba216d6a39191b753b1d172f9a2615823fc
-
SSDEEP
1536:QbQtTquyqPiHFP2dNfTfFcEqU5t6Jt5TbZ2FR50whQ9G11IyE2W6OGJD:9TPaHZsfTkuAJt5T1o50x+GpzG
Malware Config
Signatures
Files
-
f8f03d3c79177ce634728279c7b5bb798651d3937bf405c8d4edba3bf33c180d.exe windows x86
10c6a04bc0245f8267be367939d30ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
VirtualProtect
GetSystemInfo
GetLocaleInfoA
FlushFileBuffers
InterlockedIncrement
WaitForMultipleObjects
GetLastError
GetModuleHandleA
ResetEvent
HeapFree
GetProcessHeap
CreateEventW
GetStdHandle
CloseHandle
GetWindowsDirectoryA
CreateFileA
lstrcatA
user32
TranslateMessage
GetMessageW
LoadImageW
GetDC
ReleaseDC
MessageBoxW
SetWindowTextW
ShowWindow
SetDlgItemTextW
SetFocus
SendMessageW
PostThreadMessageW
GetDlgItemTextW
GetDlgItem
GetWindowTextLengthW
EnableWindow
GetWindowLongW
SetWindowLongW
SendDlgItemMessageW
GetParent
PostMessageW
LoadStringW
KillTimer
DispatchMessageW
SetTimer
PostQuitMessage
LoadCursorW
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetSysColor
gdi32
GetObjectW
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetStockObject
Rectangle
MoveToEx
LineTo
Ellipse
RoundRect
comdlg32
GetOpenFileNameW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFolderPathW
SHBindToParent
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHSetLocalizedName
ole32
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoUninitialize
shlwapi
StrFormatByteSizeW
StrRetToBufW
SHSetValueW
PathFindFileNameW
PathAddExtensionW
PathAppendW
PathRemoveFileSpecW
StrStrIA
PathCombineW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ