Static task
static1
Behavioral task
behavioral1
Sample
d8ee4883b006ab0793f5ffa236cd6aa271bc163da0226e8206cf6c4f2e692b5e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d8ee4883b006ab0793f5ffa236cd6aa271bc163da0226e8206cf6c4f2e692b5e.exe
Resource
win10v2004-20220901-en
General
-
Target
d8ee4883b006ab0793f5ffa236cd6aa271bc163da0226e8206cf6c4f2e692b5e
-
Size
264KB
-
MD5
80219423b66c60d5e38e51222e58a96f
-
SHA1
6394eeebb8e975eafeec1776c05ed52e39e77d95
-
SHA256
d8ee4883b006ab0793f5ffa236cd6aa271bc163da0226e8206cf6c4f2e692b5e
-
SHA512
8fffd4ae7e516663d5d62ffe9382fb32e91994f55f5d5567a4aa6adad5ec2c073b340fc32f590c7fe0e5b836217edf804e77acdf012e98747d2fd4b4763c36a8
-
SSDEEP
6144:pa4tUmSm7hchA8MxsMIVBGDSsQoSsQLH5AdC:pXqU8YSsrSsPdC
Malware Config
Signatures
Files
-
d8ee4883b006ab0793f5ffa236cd6aa271bc163da0226e8206cf6c4f2e692b5e.exe windows x86
6d2aba5628daf7b48b8cae9977525837
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GetTickCount
SetErrorMode
Sleep
GetLocalTime
SetFileTime
GetDriveTypeA
GetLogicalDriveStringsA
SetLastError
SetFilePointer
SetEndOfFile
GetModuleFileNameA
CreateEventA
GetTempFileNameA
GetWindowsDirectoryA
ExitProcess
VirtualAlloc
VirtualFree
GetSystemInfo
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSection
HeapFree
GetProcessHeap
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
TerminateProcess
CopyFileA
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
FindFirstFileA
FormatMessageA
MoveFileA
SetUnhandledExceptionFilter
UnmapViewOfFile
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
CreateFileMappingA
SetEvent
SetThreadPriority
CreateThread
WaitForSingleObject
GetVolumeInformationA
GetComputerNameA
IsBadReadPtr
GetCurrentThread
IsBadWritePtr
VirtualQuery
lstrcpynA
FlushFileBuffers
VirtualUnlock
VirtualLock
GetCurrentDirectoryA
GetModuleHandleA
CreateDirectoryA
GetDiskFreeSpaceA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
GetFileSize
ReadFile
CloseHandle
DeleteFileA
GetFileAttributesA
GetExitCodeProcess
GetCurrentProcess
SetStdHandle
GetVersion
FindClose
GetLastError
RaiseException
IsBadCodePtr
GetStringTypeW
HeapCreate
HeapDestroy
GetStringTypeA
GetEnvironmentVariableA
GetFileType
GetVersionExA
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
WideCharToMultiByte
TlsGetValue
MultiByteToWideChar
TlsAlloc
TlsSetValue
GetACP
GetCPInfo
GetOEMCP
HeapSize
HeapReAlloc
GetStartupInfoA
RtlUnwind
GetCommandLineA
GetFullPathNameA
user32
EndDialog
DialogBoxParamA
GetDlgItem
SetDlgItemTextA
ShowWindow
EnableWindow
GetDlgItemTextA
SetTimer
CreateWindowExA
IsWindowVisible
SetWindowTextA
LoadImageA
GetSystemMetrics
RegisterClassExA
DefWindowProcA
LoadIconA
PostQuitMessage
wsprintfA
IsWindow
MessageBoxA
GetTopWindow
FindWindowA
GetLastActivePopup
SetClassLongA
SetForegroundWindow
LoadStringA
SendDlgItemMessageA
MoveWindow
SetFocus
ReleaseDC
GetWindowRect
GetDC
DestroyWindow
CreateDialogParamA
UpdateWindow
LoadCursorA
SetWindowPos
gdi32
GetStockObject
GetDeviceCaps
comctl32
ord17
advapi32
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
shell32
ShellExecuteA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ