Static task
static1
Behavioral task
behavioral1
Sample
d8e180cb3f71f75e889a83c4150e4c08acf21efa5aaf56df0bece00350e6fd5b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d8e180cb3f71f75e889a83c4150e4c08acf21efa5aaf56df0bece00350e6fd5b.exe
Resource
win10v2004-20220901-en
General
-
Target
d8e180cb3f71f75e889a83c4150e4c08acf21efa5aaf56df0bece00350e6fd5b
-
Size
208KB
-
MD5
43c15e01f84c774b88b61e33081b95e0
-
SHA1
74bbdf48b972918d15768cff4f29d037d469b547
-
SHA256
d8e180cb3f71f75e889a83c4150e4c08acf21efa5aaf56df0bece00350e6fd5b
-
SHA512
935efb8c4da179b881367e442b414cd0b31f2e2d6f79a577bc1679e08f4a6e6bec12a6aac62fd8fad6012c0d0816b0814b13cf267f4e922387d084502247eec2
-
SSDEEP
6144:1el+0LCmoR68643ryrZoIfel36q0QqvceN47E:1L0LCm668643ryrZoEel3t0zcfE
Malware Config
Signatures
Files
-
d8e180cb3f71f75e889a83c4150e4c08acf21efa5aaf56df0bece00350e6fd5b.exe windows x86
15378285981e400e15e65ce35468ce81
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
lstrcpyA
WaitForSingleObject
CreateFileW
GetACP
CreateThread
InterlockedDecrement
lstrlenW
GetCurrentProcess
GetSystemTimeAsFileTime
ReleaseSemaphore
WaitForMultipleObjects
GlobalAlloc
HeapFree
GlobalLock
lstrcmpiW
SetUnhandledExceptionFilter
GetFileAttributesW
GetCurrentThread
GetProfileIntA
MultiByteToWideChar
GetPrivateProfileStringW
InterlockedIncrement
lstrlenA
QueryPerformanceCounter
SetThreadPriority
GlobalFree
GetLastError
GetFileSize
GetDiskFreeSpaceW
IsBadCodePtr
HeapAlloc
CreateSemaphoreW
VirtualFree
WriteFile
GetLocaleInfoW
LeaveCriticalSection
GetQueuedCompletionStatus
InterlockedExchange
GetProcessHeap
GetThreadPriority
CloseHandle
LoadLibraryW
GetCurrentProcessId
GetVersionExW
GlobalUnlock
GetTickCount
IsBadReadPtr
lstrcpynW
MulDiv
EnterCriticalSection
GetLocaleInfoA
WideCharToMultiByte
GetFullPathNameW
ResetEvent
SetEndOfFile
ReadFile
DeleteCriticalSection
GetModuleFileNameA
InitializeCriticalSection
GlobalMemoryStatus
GetProcAddress
GlobalFindAtomA
CreateEventW
SetEvent
IsBadWritePtr
GlobalHandle
lstrcpyW
SetFilePointer
FreeLibrary
user32
LoadStringW
DestroyWindow
CheckDlgButton
GetWindowLongW
DefWindowProcW
EnableWindow
CreateDialogParamW
SetCursor
GetDlgItem
ShowWindow
GetAsyncKeyState
CheckRadioButton
ReleaseDC
GetDlgItemInt
SetDlgItemInt
GetDesktopWindow
InvalidateRect
SetDlgItemTextW
SendMessageW
IsWindowVisible
IsRectEmpty
SetWindowLongW
IsWindow
TranslateMessage
ClientToScreen
MoveWindow
PeekMessageW
GetWindowRect
DispatchMessageW
GetClientRect
LoadCursorW
GetDC
netshell
StartNCW
NcIsValidConnectionName
DllGetClassObject
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ