Static task
static1
Behavioral task
behavioral1
Sample
8414d9f83a4a7096e5428d0e5cca4ccd441fef6865cdd5dd9630abedb86d6f51.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8414d9f83a4a7096e5428d0e5cca4ccd441fef6865cdd5dd9630abedb86d6f51.exe
Resource
win10v2004-20221111-en
General
-
Target
8414d9f83a4a7096e5428d0e5cca4ccd441fef6865cdd5dd9630abedb86d6f51
-
Size
622KB
-
MD5
55a858568ff9823f330bc757539db4f8
-
SHA1
a340ae1686128d195b6a2da8593327fb1ad64ad0
-
SHA256
8414d9f83a4a7096e5428d0e5cca4ccd441fef6865cdd5dd9630abedb86d6f51
-
SHA512
db495c56210a375ab699a27b5f9783153b096aff83310af34942b1d76ccf21c52ca650fc350f41e002f579a23baf47b11033744643d44bffb26c56ec1757ed04
-
SSDEEP
12288:cWMKWFccSrjS8XEEbthqD4rkKk3UIIuMSNZDxIFHDRsKIa:oKWFczvX344rk63jSpIFoa
Malware Config
Signatures
Files
-
8414d9f83a4a7096e5428d0e5cca4ccd441fef6865cdd5dd9630abedb86d6f51.exe windows x86
9c48c82cd1e57cb315b300a3dda8c044
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetModuleHandleA
GetCurrentThread
ExitProcess
HeapAlloc
GetProcessHeap
GetOEMCP
FindResourceA
Sleep
VirtualFree
FindResourceW
HeapCreate
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
LockResource
GetEnvironmentStrings
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
GetConsoleCP
SetStdHandle
InterlockedIncrement
TlsSetValue
CreateEventA
CreateFileW
DuplicateHandle
FindFirstFileA
GetProcAddress
GetWindowsDirectoryA
DeleteFileA
LCMapStringW
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
SetEvent
GetLastError
SetHandleCount
EnterCriticalSection
LeaveCriticalSection
GlobalAlloc
WriteConsoleA
TerminateProcess
GetSystemDirectoryA
SetUnhandledExceptionFilter
CreateThread
CreateMutexA
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetVersionExA
IsDebuggerPresent
GetModuleFileNameW
OutputDebugStringA
FormatMessageA
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetStringTypeA
GetCPInfo
FreeEnvironmentStringsW
LoadLibraryExW
CreateFileA
lstrcatA
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
GetFileAttributesA
GetStdHandle
GetCurrentProcessId
GetCurrentThreadId
GetCommandLineA
LoadLibraryW
GetVersion
user32
SetWindowLongA
GetSystemMetrics
BeginPaint
SetFocus
FillRect
SetTimer
GetSubMenu
EnableMenuItem
TranslateMessage
ScreenToClient
ReleaseDC
GetCursorPos
GetDC
IsWindow
SetWindowPos
PostQuitMessage
SetForegroundWindow
GetSysColor
CallWindowProcA
SetCursor
ClientToScreen
advapi32
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
Sections
.text Size: 594KB - Virtual size: 917KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ