Static task
static1
Behavioral task
behavioral1
Sample
8a3c1532ddc68aef77d49a1d57a06a4d1ef687aeb2e567e059e25ba9a88be98a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8a3c1532ddc68aef77d49a1d57a06a4d1ef687aeb2e567e059e25ba9a88be98a.exe
Resource
win10v2004-20220901-en
General
-
Target
8a3c1532ddc68aef77d49a1d57a06a4d1ef687aeb2e567e059e25ba9a88be98a
-
Size
263KB
-
MD5
ba8febca328930117a05cd32312d893b
-
SHA1
ffce746bbf4640dd766b9f48d1e60daa5eceefcf
-
SHA256
8a3c1532ddc68aef77d49a1d57a06a4d1ef687aeb2e567e059e25ba9a88be98a
-
SHA512
a01839b863dd0f9f46a033da1966bcf8330d007b0d5aa3c02dac2a04ffbc0d8df782f655df8fcab07f8c3b975f598e21eea6c408a18461483b2547e76e3c6973
-
SSDEEP
3072:PlKSVFP4rdytx3tjh+45Ar7rSVKWKFGB6z36s96/LEpeChFxpJx6g58yNAQOhxTt:2Itx+45S7rST9i6ee2xleFhxTt
Malware Config
Signatures
Files
-
8a3c1532ddc68aef77d49a1d57a06a4d1ef687aeb2e567e059e25ba9a88be98a.exe windows x86
f74e9f2e1caaf704accbcbe2c20e7ac8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
EnterCriticalSection
VirtualAllocEx
AreFileApisANSI
DeleteCriticalSection
LoadModule
SetComputerNameA
WriteProcessMemory
GetEnvironmentStringsA
EnumResourceNamesA
MoveFileExW
FindFirstVolumeMountPointA
WaitForMultipleObjects
WriteFileEx
GetModuleFileNameA
VerifyVersionInfoA
SetThreadAffinityMask
GetConsoleHardwareState
GetVolumePathNameA
GetLastError
advapi32
CredWriteDomainCredentialsA
opengl32
glSelectBuffer
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
dpnet
DirectPlay8Create
user32
CreateCaret
SendNotifyMessageA
EnumChildWindows
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ