Static task
static1
Behavioral task
behavioral1
Sample
8356480a0128448cb64dc5f5add0cb89e88d4550a32cdc7ddb663811d94625f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8356480a0128448cb64dc5f5add0cb89e88d4550a32cdc7ddb663811d94625f7.exe
Resource
win10v2004-20220812-en
General
-
Target
8356480a0128448cb64dc5f5add0cb89e88d4550a32cdc7ddb663811d94625f7
-
Size
279KB
-
MD5
7560c0d669cbe4d6d84fbd2aa0f12d20
-
SHA1
46760e50fb6f40d7b794f1c07d080de81ca55167
-
SHA256
8356480a0128448cb64dc5f5add0cb89e88d4550a32cdc7ddb663811d94625f7
-
SHA512
1773668998605102748737677186e21bca25bc7f4c10c9f7eb0d10b1667648b07dd2fd17a2bf0358b142fcdbc5bf0d168eff9638c41c31733cacc179f7a3845e
-
SSDEEP
6144:7uV5z9ACzLRLFPZLgglYpsopGzN9jOHUR:uz9AYbPZLgnSopGh9a0R
Malware Config
Signatures
Files
-
8356480a0128448cb64dc5f5add0cb89e88d4550a32cdc7ddb663811d94625f7.exe windows x86
e700dd13fa2b8490b4add525363419b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
ReadFile
GetFileSizeEx
LocalFree
CreateDirectoryW
GetFileAttributesW
ReleaseMutex
WaitForSingleObject
GetTimeFormatW
GetLocalTime
OutputDebugStringW
MapViewOfFile
CreateMutexW
GetModuleFileNameW
GetCommandLineW
CloseHandle
GetSystemDirectoryW
GetCurrentProcess
GetVersionExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFileEx
CreateFileW
GetLastError
Sleep
GetModuleHandleW
GetProcAddress
GetProcessHeap
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
LoadLibraryA
HeapAlloc
HeapFree
RtlUnwind
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
GetStdHandle
GetModuleFileNameA
RaiseException
GetModuleHandleA
LCMapStringW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
user32
wsprintfW
advapi32
RegSetValueExW
AllocateAndInitializeSid
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
FreeSid
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
shell32
SHGetFolderPathW
shlwapi
PathAppendW
PathIsNetworkPathW
PathStripToRootW
PathIsRelativeW
PathRemoveFileSpecW
PathStripPathW
PathSkipRootW
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 135KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE