Static task
static1
Behavioral task
behavioral1
Sample
8933c7a53c2eeecf7b79bddd042b08ac4a0c0b1e275d12aa1051e1e176b18b16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8933c7a53c2eeecf7b79bddd042b08ac4a0c0b1e275d12aa1051e1e176b18b16.exe
Resource
win10v2004-20220812-en
General
-
Target
8933c7a53c2eeecf7b79bddd042b08ac4a0c0b1e275d12aa1051e1e176b18b16
-
Size
714KB
-
MD5
0b34f3371fd682ca7734fec7521c085a
-
SHA1
cea4409388cc6461960dea0288eec3103ab8f2bf
-
SHA256
8933c7a53c2eeecf7b79bddd042b08ac4a0c0b1e275d12aa1051e1e176b18b16
-
SHA512
514099c1b44d726a827c44563922f9870b1bf2cc8fb67463bca4f5b12eb4c7001771172adc43be431f3c44294e53da33c55376f6706392058fd8e063b24b7d2e
-
SSDEEP
12288:czWiY4RcFTz0KwBmiMtOWZ3oeNtJN5lOgTgx/mdiNWMd:PU+1wBmiMtlnnDi/cih
Malware Config
Signatures
Files
-
8933c7a53c2eeecf7b79bddd042b08ac4a0c0b1e275d12aa1051e1e176b18b16.exe windows x86
62473483961bcdac9860aa4f0b4ca93b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
ole32
OleUninitialize
OleInitialize
gdi32
SetBkColor
GetDeviceCaps
SelectObject
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
version
GetFileVersionInfoSizeA
VerQueryValueA
user32
GetCursorPos
DestroyWindow
GetMessageA
GetParent
UpdateWindow
DefWindowProcA
ShowWindow
EnableWindow
TranslateMessage
GetWindow
EnableMenuItem
GetWindowLongA
CreateWindowExA
FillRect
EndPaint
MapWindowPoints
SetFocus
GetSystemMetrics
GetDC
ReleaseCapture
SetWindowLongA
SetWindowTextA
CheckMenuItem
GetSubMenu
SetTimer
GetDlgItem
LoadCursorA
LoadIconA
SetForegroundWindow
ReleaseDC
EndDialog
MoveWindow
MessageBoxA
GetSysColor
DrawTextA
GetClientRect
GetFocus
PeekMessageA
DispatchMessageA
IsWindow
SetWindowPos
GetWindowRect
kernel32
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
CreateFileA
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
SetFilePointer
CreateThread
SetUnhandledExceptionFilter
GetSystemDirectoryA
TerminateProcess
WriteConsoleA
GlobalAlloc
GetConsoleMode
SetEndOfFile
InterlockedIncrement
GetLastError
GetCurrentThread
GetCommandLineA
GetCurrentThreadId
GetVersion
GetTickCount
GetCurrentProcessId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
WriteConsoleW
VirtualFree
HeapCreate
CreateProcessA
SizeofResource
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
Sleep
HeapSize
GetCPInfo
GetCommandLineW
GetEnvironmentStrings
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
FindNextFileW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
UnmapViewOfFile
LeaveCriticalSection
TlsSetValue
GetFileType
CreateFileW
CreateEventW
GetProcAddress
FindFirstFileW
CreateFileMappingA
GetDiskFreeSpaceA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GetSystemInfo
GlobalLock
DeleteFileA
CreateDirectoryA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
LoadLibraryExW
Sections
.text Size: 668KB - Virtual size: 991KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ