Static task
static1
Behavioral task
behavioral1
Sample
8887b8d605199246e89e5a7b7c4096c8d25730504fc3d1054962aa7f2e9363ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8887b8d605199246e89e5a7b7c4096c8d25730504fc3d1054962aa7f2e9363ca.exe
Resource
win10v2004-20220901-en
General
-
Target
8887b8d605199246e89e5a7b7c4096c8d25730504fc3d1054962aa7f2e9363ca
-
Size
80KB
-
MD5
822dacc7534b8389dca55cb52df3abb0
-
SHA1
7c787f2147ad58e810e24ec900e87750c6c4b873
-
SHA256
8887b8d605199246e89e5a7b7c4096c8d25730504fc3d1054962aa7f2e9363ca
-
SHA512
0e33264a9e14b129be9a38cf52be8ba19c5e78b6ea1d107761f66fd32257aec9a7af7c2efb7b77dd56b11e5b94c26f752db3827078da7f9bd7791539dcf28277
-
SSDEEP
1536:aI0vo8+wBW7w+NlRSab43E0ZS9skC7lu5L/Odgc9zW:cvok+vMab4joskQuhOWe
Malware Config
Signatures
Files
-
8887b8d605199246e89e5a7b7c4096c8d25730504fc3d1054962aa7f2e9363ca.exe windows x86
f4e3b9cc1977acd2978bdb7968aa740a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
GetPriorityClass
IsBadReadPtr
VirtualProtect
SuspendThread
GetStdHandle
GetModuleHandleA
GetCommandLineA
DeleteFileA
GetFileAttributesA
HeapSize
ResumeThread
WriteFile
CreatePipe
CreateDirectoryA
SetLocalTime
ReadConsoleW
GlobalSize
ResumeThread
GetDriveTypeA
GetLocaleInfoA
user32
DrawIcon
SetRect
DispatchMessageA
wsprintfA
LoadCursorA
GetWindowLongA
GetWindowTextW
DestroyMenu
GetWindowLongA
GetMessageA
SetCursor
DestroyIcon
PeekMessageA
els
DllRegisterServer
DllGetClassObject
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE