Static task
static1
Behavioral task
behavioral1
Sample
8627ef950a2b5805faf4a720cb191745e2eefbe67ba89d7fb392b5bc8bf3951a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8627ef950a2b5805faf4a720cb191745e2eefbe67ba89d7fb392b5bc8bf3951a.exe
Resource
win10v2004-20220812-en
General
-
Target
8627ef950a2b5805faf4a720cb191745e2eefbe67ba89d7fb392b5bc8bf3951a
-
Size
299KB
-
MD5
0f42cd6d0fbadc77a1e3427dd9c8b3c3
-
SHA1
5192ede42e6df35a4b3cb10bd5db60054a606c8c
-
SHA256
8627ef950a2b5805faf4a720cb191745e2eefbe67ba89d7fb392b5bc8bf3951a
-
SHA512
61d0698e4fc30a7eb2958e6a3a2b66e416dd0f24408c0309e4ebb878bdfe397440818ef5191cc488b652989cf1112e4d7616df723beed9fbdaa5b4482301cfe4
-
SSDEEP
6144:wgkBd9mb3aIZSD+A6YOA6kID5qiI1TM8oo+nnOC0N/t0u0U0s6OVB/soj75:6qb3TUT6YOOID5qiibovnnOD70aDB/sO
Malware Config
Signatures
Files
-
8627ef950a2b5805faf4a720cb191745e2eefbe67ba89d7fb392b5bc8bf3951a.exe windows x86
2fccb348eb87d0b00d15ec1fc980ee79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
GetStockObject
CreateCompatibleDC
CreateSolidBrush
user32
PostQuitMessage
SetWindowPos
SendMessageA
MsgWaitForMultipleObjects
DestroyWindow
GetParent
UpdateWindow
ShowWindow
EnableWindow
TranslateMessage
LoadStringA
RegisterClassA
GetWindowLongA
CreateWindowExA
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
SetCapture
SetWindowLongA
EndDialog
SetWindowTextA
GetDlgItem
ScreenToClient
LoadCursorA
SetForegroundWindow
GetClientRect
CallWindowProcA
SetCursor
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
kernel32
FindNextFileA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
CreateFileA
FreeEnvironmentStringsW
WideCharToMultiByte
WaitForSingleObject
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
GetExitCodeProcess
GetEnvironmentVariableA
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
InitializeCriticalSection
GetFileAttributesA
ReleaseMutex
GetStdHandle
GetStringTypeA
VirtualAlloc
FindResourceA
Sleep
CreateProcessW
UnmapViewOfFile
IsValidCodePage
SizeofResource
GetModuleHandleW
GetACP
CloseHandle
ReadFile
GetModuleHandleA
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
LockResource
GetCurrentProcessId
GetEnvironmentStrings
VirtualFree
lstrlenW
GetThreadLocale
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
HeapCreate
LCMapStringW
GetLastError
LeaveCriticalSection
HeapAlloc
TlsSetValue
GetFileType
CreateFileW
GetProcAddress
FindFirstFileW
ResetEvent
CompareStringA
FindFirstFileA
CompareStringW
GetStartupInfoW
GlobalLock
SetEvent
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetCurrentThreadId
SetEndOfFile
VirtualQuery
GetVersion
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
GetLocalTime
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetPrivateProfileStringA
GetModuleFileNameA
FlushFileBuffers
ExitProcess
IsDebuggerPresent
VirtualProtect
GetModuleFileNameW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ