Static task
static1
Behavioral task
behavioral1
Sample
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe.exe
Resource
win10v2004-20220901-en
General
-
Target
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
Size
885KB
-
MD5
a57e1e6fe1c98d2e75799a46e9eb5797
-
SHA1
7878e7042c355546c118a38b90d8f7221f74d8a4
-
SHA256
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
SHA512
5764f3b1971f64c9d55f387524d92038350dbdf9a7195dc7e3f7b83760d93f45e73dd4c4af6cc597add838acd2d4a4e5b7a96a3444e3c8b0369b1d487621909d
-
SSDEEP
12288:zD7Z7cwy8U9JlpYqWYgeWYg955/155/0QebUlAAsDsKKAosRn6X:z57ctflKgQKUKRDsKKAjN6
Malware Config
Signatures
Files
-
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe.exe windows x64
5f24714164a9ad4859d8c58015a5851b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
TerminateProcess
SetThreadPriority
SetFilePointer
CreateMutexW
InitializeCriticalSectionEx
FindClose
CreateFileW
ReleaseMutex
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
FormatMessageW
CopyFileA
GetLastError
Process32NextW
Process32FirstW
CloseHandle
RaiseException
DecodePointer
WriteFile
LocalFree
GetFileSize
DeleteCriticalSection
CopyFileW
WideCharToMultiByte
GetConsoleWindow
OpenMutexW
GetDriveTypeW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
SetEndOfFile
WriteConsoleW
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
GetCurrentProcess
FindNextFileW
SetPriorityClass
FindFirstFileW
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetThreadPriorityBoost
SetProcessPriorityBoost
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
MultiByteToWideChar
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
WaitForSingleObjectEx
EncodePointer
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringEx
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
RtlUnwindEx
InterlockedPushEntrySList
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
MoveFileExW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
ReadConsoleW
HeapReAlloc
HeapSize
RtlUnwind
user32
MessageBoxW
ShowWindow
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
shell32
SHEmptyRecycleBinW
iphlpapi
GetIpNetTable
ws2_32
inet_ntoa
netapi32
NetShareEnum
NetApiBufferFree
Sections
.text Size: 608KB - Virtual size: 607KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ