Static task
static1
Behavioral task
behavioral1
Sample
8b319c60fadea11665c997899aa75846c9ec243021dcc60a23e24a357199aed4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b319c60fadea11665c997899aa75846c9ec243021dcc60a23e24a357199aed4.exe
Resource
win10v2004-20220812-en
General
-
Target
8b319c60fadea11665c997899aa75846c9ec243021dcc60a23e24a357199aed4
-
Size
221KB
-
MD5
a2c4f8ee430fbb8ce1574b6ae14583b3
-
SHA1
7ef1d60c3d0226f733c7a996217fcafcc96942fb
-
SHA256
8b319c60fadea11665c997899aa75846c9ec243021dcc60a23e24a357199aed4
-
SHA512
179fec791f6821f2f3564a58d67176cbeeaabe9ee81c5e123cd423e903d5661365ab5868647677059bf3155741e320fb8b5921397abcdfca7c054d348b976bfb
-
SSDEEP
3072:pWeNJofUXhT6bmzKsB+c1pzJyW9uJTlXIDPHT2G:pNIsBPjuRXsr2
Malware Config
Signatures
Files
-
8b319c60fadea11665c997899aa75846c9ec243021dcc60a23e24a357199aed4.exe windows x86
fc7b403ff968d67fd61aab9dc82feca2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
LocalAlloc
Beep
TlsAlloc
GlobalLock
GlobalAlloc
CloseHandle
GetCurrentDirectoryA
GetCurrencyFormatA
lstrcmpiA
CreateThread
lstrcatA
SetEnvironmentVariableA
GetCurrentThread
GetTempFileNameA
GetTempPathA
GlobalMemoryStatus
GetProcAddress
LoadLibraryA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
GetExitCodeThread
ExitThread
TlsGetValue
SetCurrentDirectoryA
LocalFree
HeapReAlloc
VirtualAlloc
RaiseException
WriteFile
RtlUnwind
VirtualFree
HeapCreate
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
MessageBoxA
EndDialog
FindWindowA
EnableScrollBar
SetLastErrorEx
SetClipboardData
GetDlgItemTextA
gdi32
CreatePen
DeleteObject
CreateFontIndirectA
CreateRectRgn
comdlg32
FindTextA
shell32
ShellExecuteA
msvcrt
_itoa
shlwapi
PathIsDirectoryA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yrdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE