Static task
static1
Behavioral task
behavioral1
Sample
8fb6bea945187deeea63b04270604d211186e419ddfe7da7280b42a83f9323ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8fb6bea945187deeea63b04270604d211186e419ddfe7da7280b42a83f9323ac.exe
Resource
win10v2004-20220901-en
General
-
Target
8fb6bea945187deeea63b04270604d211186e419ddfe7da7280b42a83f9323ac
-
Size
610KB
-
MD5
8472f49668f7d018cc2f6dba48c06f80
-
SHA1
bb76ba0e09502880c66973ed7d7dcf7e82a2e2dd
-
SHA256
8fb6bea945187deeea63b04270604d211186e419ddfe7da7280b42a83f9323ac
-
SHA512
6fc41057581274044e4fa4b1aa2485400adf2e8b584137bbad63fde21b2207324049afd42a8e2d78ec63d7c5d2e8a421eeb2d6a8e0057ae3c63117747f899f79
-
SSDEEP
12288:K6lQ0bI/e5YdOgTQqFFUAV75vhCe2/svLIFNQTSwr:5i6I2adOgTFUAVZCe7zyN+fr
Malware Config
Signatures
Files
-
8fb6bea945187deeea63b04270604d211186e419ddfe7da7280b42a83f9323ac.exe windows x64
9520936866bbbf091d0664003aa711d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindResourceExW
GetModuleFileNameA
EndUpdateResourceW
LocalFree
GetFileInformationByHandle
GetLocalTime
CreateDirectoryA
MultiByteToWideChar
WriteFile
GetWindowsDirectoryA
CreateThread
CloseHandle
DeviceIoControl
CreateEventW
CreateFileMappingW
GetProcAddress
SetLastError
GetLastError
GetFileSizeEx
GetTempPathW
CreateFileW
LoadResource
GetFileAttributesW
LoadLibraryW
WideCharToMultiByte
SetEvent
WaitForSingleObject
CreateDirectoryW
MoveFileExW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
GetTempFileNameW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
OutputDebugStringA
GetStartupInfoW
SizeofResource
LockResource
GetCommandLineW
UpdateResourceW
BeginUpdateResourceA
CreateFileA
Sleep
VirtualProtect
GetModuleHandleW
GetModuleFileNameW
msvcrt
_snprintf
?terminate@@YAXXZ
memmove
memset
memcpy
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
__setusermatherr
_amsg_exit
_initterm
_acmdln
_cexit
_ismbblead
_exit
ferror
__C_specific_handler
__getmainargs
_callnewh
malloc
free
??0exception@@QEAA@AEBQEBDH@Z
_CxxThrowException
_strlwr
_errno
__CxxFrameHandler
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_commode
_strdup
sprintf
strncpy
_vsnprintf
time
_purecall
fopen
fclose
ftell
fread
realloc
_XcptFilter
exit
printf
rewind
fseek
shell32
CommandLineToArgvW
SHGetFolderPathW
advapi32
GetSecurityInfo
SetSecurityInfo
SetEntriesInAclW
ConvertStringSidToSidW
mpr
WNetGetConnectionW
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 556KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE