Static task
static1
Behavioral task
behavioral1
Sample
8d3f2e99c1bd7314e177d89e1e2be3d1ddea772135fcc9073f1cae570192483a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d3f2e99c1bd7314e177d89e1e2be3d1ddea772135fcc9073f1cae570192483a.exe
Resource
win10v2004-20220812-en
General
-
Target
8d3f2e99c1bd7314e177d89e1e2be3d1ddea772135fcc9073f1cae570192483a
-
Size
58KB
-
MD5
0b651fdcd8ddd4406bf9d35473a602c2
-
SHA1
3b2f2c81e2eff8ce7e0a9b9b86a70c07e7f1b4cf
-
SHA256
8d3f2e99c1bd7314e177d89e1e2be3d1ddea772135fcc9073f1cae570192483a
-
SHA512
a6c6c5ba0fe9f9e139bf7a9683072f56b5b07126aa0b565e75e5cbc3004e152bcee868136e0035904236752771380d633c5ce7dbb542e5dbe08dd2c55755ef7b
-
SSDEEP
1536:ArGvQKOb83IRWdknvs6M/tupHxoGsUJ1:AXbM/dknvs66upHxtsUJ1
Malware Config
Signatures
Files
-
8d3f2e99c1bd7314e177d89e1e2be3d1ddea772135fcc9073f1cae570192483a.exe windows x86
fc901ee9816298fddfaf7345d4f5a6b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
wininet
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindAtomA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
lstrcatA
lstrcpyA
msvcrt
_stricmp
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
atol
fclose
fopen
fread
free
fseek
ftell
fwrite
malloc
memchr
memcpy
memmove
realloc
remove
signal
strcmp
strerror
strstr
shell32
SHGetFolderPathA
ShellExecuteA
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE