Static task
static1
Behavioral task
behavioral1
Sample
8815f01fe7a8928c1803909fc5793c021703e2b8c5835efee13d6b8472b2d862.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8815f01fe7a8928c1803909fc5793c021703e2b8c5835efee13d6b8472b2d862.exe
Resource
win10v2004-20220812-en
General
-
Target
8815f01fe7a8928c1803909fc5793c021703e2b8c5835efee13d6b8472b2d862
-
Size
415KB
-
MD5
00411a67344dac38d969492deef61106
-
SHA1
388e0b1205a68bab310a044ae9459b61e0c6eb75
-
SHA256
8815f01fe7a8928c1803909fc5793c021703e2b8c5835efee13d6b8472b2d862
-
SHA512
73e4b96e022a1fdcf9c7eb30d35702e827a868e5baa928714187c061f84c7c379f482e3e9ee46c21b3e7b6f8619327969e46d134ad9af69199ace67cacb7f566
-
SSDEEP
6144:tdkWeVV0MQsAWxcmdhZWlBQyyFjqyC37KYCVweHbxGqZQ+uEuzKy2:tpieh9WgJ3eHxlBuvzT2
Malware Config
Signatures
Files
-
8815f01fe7a8928c1803909fc5793c021703e2b8c5835efee13d6b8472b2d862.exe windows x86
d2a70435d65d511d7f9f3da204ae1e2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDeskWallpaper
CreateAcceleratorTableA
RegisterClassA
RegisterClassExA
kernel32
WaitForSingleObject
lstrcmpi
InterlockedExchange
SetStdHandle
FlushFileBuffers
GetCurrentProcess
GetACP
FreeLibrary
IsDebuggerPresent
HeapSize
GetCommandLineA
GetUserDefaultLCID
GetStartupInfoA
SetLastError
SetTimeZoneInformation
ExitProcess
SetEnvironmentVariableA
GetCPInfo
GetConsoleOutputCP
EnumSystemLocalesA
GetLocaleInfoA
MultiByteToWideChar
WriteConsoleA
GetShortPathNameW
EnumDateFormatsA
GetModuleHandleA
GetTickCount
WideCharToMultiByte
TlsFree
GetStringTypeW
GetStringTypeA
LCMapStringW
GetPrivateProfileIntW
CompareStringA
GetSystemTimeAsFileTime
GetVersionExA
TlsGetValue
SetFilePointer
GetCurrentThread
GetProcAddress
IsValidCodePage
GetEnvironmentStrings
LCMapStringA
SetUnhandledExceptionFilter
DeleteFileW
HeapCreate
CreateFileA
LeaveCriticalSection
FreeEnvironmentStringsA
UnhandledExceptionFilter
TlsSetValue
GetCurrentProcessId
CloseHandle
InterlockedDecrement
GetLocaleInfoW
HeapReAlloc
WriteFile
TerminateProcess
SetHandleCount
GlobalAddAtomW
GetFileSize
InterlockedIncrement
SetConsoleCtrlHandler
CompareStringW
GetSystemTime
VirtualFree
VirtualQuery
DeleteCriticalSection
InitializeCriticalSection
GetEnvironmentStringsW
CreateMutexA
GetTimeFormatA
GetLastError
FreeEnvironmentStringsW
IsValidLocale
QueryPerformanceCounter
GetProcessHeap
GetConsoleCP
WriteConsoleW
GetTimeZoneInformation
ReadFile
HeapDestroy
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
HeapFree
RtlUnwind
GetFileType
TlsAlloc
OpenMutexA
DebugBreak
CreateNamedPipeA
VirtualAlloc
GetOEMCP
Sleep
GetCurrentThreadId
GetDateFormatA
GetConsoleMode
LoadLibraryA
HeapAlloc
comctl32
CreateMappedBitmap
ImageList_Duplicate
ImageList_Destroy
CreateUpDownControl
ImageList_GetIcon
ImageList_Replace
ImageList_DrawEx
ImageList_Draw
ImageList_Remove
ImageList_Copy
CreatePropertySheetPageW
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_Write
ImageList_DragEnter
ImageList_DragMove
ImageList_SetBkColor
CreatePropertySheetPageA
InitCommonControlsEx
ImageList_EndDrag
DrawStatusText
DrawStatusTextW
ImageList_SetDragCursorImage
DrawStatusTextA
gdi32
GetCharWidth32A
GetDeviceCaps
DPtoLP
RectVisible
DeleteDC
GetEnhMetaFileBits
WidenPath
CreateDCA
GetWinMetaFileBits
DeleteObject
SelectObject
DeviceCapabilitiesExA
CreateBrushIndirect
GetObjectW
AbortDoc
Chord
GetMapMode
comdlg32
GetSaveFileNameW
ChooseFontA
GetFileTitleA
shell32
ShellHookProc
ShellExecuteEx
SHBrowseForFolder
DragQueryFileAorW
ExtractIconW
wininet
SetUrlCacheEntryInfoA
InternetWriteFileExW
FtpFindFirstFileW
HttpAddRequestHeadersW
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ