Static task
static1
Behavioral task
behavioral1
Sample
8ea3520e2a8af1e6b7306b2fb7e8601cdf22f0f06485ea9443d0e447679addcc.exe
Resource
win7-20220901-en
General
-
Target
8ea3520e2a8af1e6b7306b2fb7e8601cdf22f0f06485ea9443d0e447679addcc
-
Size
251KB
-
MD5
039f8eb9a9f3d565cb673945e76bc610
-
SHA1
a78e1765013d87a85e0e968511482f064b871951
-
SHA256
8ea3520e2a8af1e6b7306b2fb7e8601cdf22f0f06485ea9443d0e447679addcc
-
SHA512
29adf0d884c1b5e803e90fab071fc9cdaaf5f4b2ce7b08b9082839f0eeafe40beac3dde0ff826c003ec051110030ae0901ee11b53b4d5e05e336651a200ec565
-
SSDEEP
6144:Uv256YnvcHt6SfqvUkIakUCT6G7GzjB2qixpcelmiQ1iQn+YQ1/3:UklGZMV9PQ1
Malware Config
Signatures
Files
-
8ea3520e2a8af1e6b7306b2fb7e8601cdf22f0f06485ea9443d0e447679addcc.exe windows x86
6306edd592f3994f53c6f6dd2e5ffb43
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateMutexA
ReadFile
GetFileSize
GetStdHandle
DuplicateHandle
CreatePipe
OpenProcess
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
FindClose
GetLastError
GetFileInformationByHandle
BackupRead
BackupSeek
SetLastError
SetThreadPriority
GetCurrentThread
SetEndOfFile
FlushFileBuffers
SetFileTime
BackupWrite
Sleep
ReleaseMutex
SuspendThread
ResumeThread
FindFirstFileA
FreeLibrary
CreateEventA
SetEvent
VirtualAlloc
VirtualFree
DeviceIoControl
lstrcmpiA
SetSystemPowerState
GetVolumeInformationA
GetDriveTypeA
GetDiskFreeSpaceA
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
MoveFileA
FindNextFileA
SetFileAttributesA
GetFileAttributesA
FormatMessageA
lstrlenW
lstrcmpiW
LoadLibraryW
GetCommandLineW
GetVolumeInformationW
GetDriveTypeW
GetDiskFreeSpaceW
GetFullPathNameW
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
RemoveDirectoryW
MoveFileW
CreateFileW
FindNextFileW
FindFirstFileW
SetFileAttributesW
GetFileAttributesW
FormatMessageW
CopyFileW
GetThreadLocale
LocalFileTimeToFileTime
GetSystemTime
GetStartupInfoA
SystemTimeToFileTime
SetPriorityClass
GetTickCount
GetPriorityClass
SetThreadLocale
GetModuleHandleA
GetProcAddress
GetCurrentProcess
MultiByteToWideChar
GetModuleFileNameA
SetUnhandledExceptionFilter
CreateFileA
SetFilePointer
GetLocalTime
WriteFile
IsBadReadPtr
CloseHandle
IsDBCSLeadByte
LoadLibraryA
GetSystemDefaultLCID
GetCommandLineA
GetVersion
user32
SetWindowLongW
GetWindowLongW
DialogBoxParamW
CreateDialogParamW
IsDialogMessageA
EndDialog
GetWindowPlacement
CreatePopupMenu
AppendMenuA
LoadStringA
LoadStringW
wsprintfA
wsprintfW
MessageBoxA
TrackPopupMenu
DestroyMenu
RegisterClassW
GetMenuState
GetClientRect
CreateWindowExA
ScreenToClient
RegisterClassA
LoadCursorA
GetParent
GetWindowTextLengthW
SetWindowTextW
GetWindowTextW
MessageBoxW
SetDlgItemTextW
GetDlgItemTextW
PeekMessageA
MoveWindow
GetWindowWord
SetWindowWord
SetWindowTextA
GetWindowTextA
SetActiveWindow
FindWindowW
CreateWindowExW
ModifyMenuW
InsertMenuW
CharUpperW
CharLowerW
GetWindowTextLengthA
CreateDialogParamA
DialogBoxParamA
CallWindowProcA
FindWindowA
CharUpperA
CallWindowProcW
CharLowerA
PostQuitMessage
GetSystemMetrics
GetCursorPos
IsChild
SystemParametersInfoA
AttachThreadInput
GetForegroundWindow
GetAsyncKeyState
GetWindowRect
SetWindowPos
SendDlgItemMessageW
SendMessageW
PostMessageW
BringWindowToTop
IsWindowVisible
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
SetDlgItemTextA
GetDlgItemTextA
GetMessageA
TranslateMessage
DispatchMessageA
TranslateAcceleratorA
DefWindowProcA
UpdateWindow
IsWindow
DestroyWindow
GetMenuItemCount
DeleteMenu
GetDlgItem
IsDlgButtonChecked
SendDlgItemMessageA
GetWindowThreadProcessId
PostMessageA
IsWindowEnabled
ExitWindowsEx
SetFocus
DrawMenuBar
ClientToScreen
PtInRect
ShowWindow
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
EnableWindow
CheckMenuItem
EnableMenuItem
KillTimer
SetTimer
GetMenu
GetWindowLongA
SetWindowLongA
SendMessageA
GetMenuStringA
ModifyMenuA
GetSubMenu
InsertMenuA
LoadIconA
SetClassLongA
LoadAcceleratorsA
RegisterWindowMessageA
GetSysColor
SetForegroundWindow
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegCreateKeyExA
LookupPrivilegeValueA
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegQueryValueW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
AdjustTokenPrivileges
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegSetValueExA
RegQueryValueExA
RegQueryValueA
RegCloseKey
OpenProcessToken
shell32
ShellExecuteW
DragQueryFileA
ShellExecuteA
ShellExecuteExA
SHGetPathFromIDList
SHBrowseForFolder
SHGetMalloc
Shell_NotifyIconA
ShellExecuteExW
DragQueryPoint
DragFinish
SHChangeNotify
DragQueryFileW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
comctl32
ord17
winmm
PlaySoundW
PlaySoundA
msvcrt40
strcmp
strtoul
strtol
strlen
strcpy
wcsncmp
wcstoul
atoi
fprintf
fopen
fgets
fclose
_mbsrchr
__p___mb_cur_max
_isctype
__p__pctype
_beginthreadex
realloc
memmove
strstr
rand
_ftol
wcschr
wcstok
malloc
swprintf
_snprintf
strchr
strrchr
sprintf
toupper
wcslen
free
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
_strnicmp
wcstol
wcsrchr
wcscpy
_wcsnicmp
wcscmp
calloc
strtok
_exit
_XcptFilter
exit
__p__acmdln
_initterm
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strdup
_wcsdup
_strcmpi
_mbschr
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
krtlkgr Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE