Static task
static1
Behavioral task
behavioral1
Sample
8e4623adac5ee3741af7da5ba1f4defd09ab1c18571cdb54c1cd16dbf1b36a8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e4623adac5ee3741af7da5ba1f4defd09ab1c18571cdb54c1cd16dbf1b36a8b.exe
Resource
win10v2004-20220901-en
General
-
Target
8e4623adac5ee3741af7da5ba1f4defd09ab1c18571cdb54c1cd16dbf1b36a8b
-
Size
2.4MB
-
MD5
506e04a60161d24258a7fcee94fd6dcb
-
SHA1
a425d37ed9f3b5282b998034c92a4dddd1c83b11
-
SHA256
8e4623adac5ee3741af7da5ba1f4defd09ab1c18571cdb54c1cd16dbf1b36a8b
-
SHA512
86858459315bc8beb62cfb63dc576e2e8c77937cf41f0d1525e9a954a406fcfe0b84a6bc7daee0cfad4257ee03a925633b5ac579bf159cd10124fbce69184d22
-
SSDEEP
49152:oci02UIWIjj++T4RJnDev2aTffBnhFs9:4NkMT+
Malware Config
Signatures
Files
-
8e4623adac5ee3741af7da5ba1f4defd09ab1c18571cdb54c1cd16dbf1b36a8b.exe windows x86
9975f4905473fe19954b08f46393ac27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
inet_addr
WSASetLastError
gethostbyname
getpeername
shutdown
closesocket
setsockopt
send
recv
select
__WSAFDIsSet
inet_ntoa
WSAStartup
WSACleanup
getservbyname
ntohs
socket
WSAGetLastError
ioctlsocket
htons
connect
kernel32
SetUnhandledExceptionFilter
SetEndOfFile
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CompareStringW
CompareStringA
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
CloseHandle
SetNamedPipeHandleState
WaitNamedPipeA
CreateFileA
GetLastError
UnmapViewOfFile
WaitForSingleObject
SetEvent
MapViewOfFile
OpenFileMappingA
OpenEventA
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
FindClose
FindNextFileA
FindFirstFileA
ReadFile
WriteFile
WaitForMultipleObjects
Sleep
GetFileAttributesA
GetFileAttributesExA
CreateEventA
ResetEvent
TryEnterCriticalSection
SetThreadPriority
GetCurrentThreadId
ExitProcess
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetConsoleCtrlHandler
WideCharToMultiByte
GetTimeZoneInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetEnvironmentVariableW
IsDebuggerPresent
SetStdHandle
GetFileType
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetDriveTypeA
HeapReAlloc
ExitThread
ResumeThread
CreateThread
WriteConsoleW
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
InterlockedDecrement
GetCurrentThread
FatalAppExitA
FreeLibrary
InterlockedExchange
LoadLibraryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetTickCount
GetCurrentProcessId
GetConsoleCP
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
RaiseException
RtlUnwind
MultiByteToWideChar
SetFilePointer
HeapSize
LoadLibraryW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
advapi32
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
Sections
.text Size: 736KB - Virtual size: 732KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 911B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE