Static task
static1
Behavioral task
behavioral1
Sample
8e43fa9d7abfc68b8e5c786bb50b15abf65c2ff5350dba5a492b067b84e05543.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e43fa9d7abfc68b8e5c786bb50b15abf65c2ff5350dba5a492b067b84e05543.exe
Resource
win10v2004-20220812-en
General
-
Target
8e43fa9d7abfc68b8e5c786bb50b15abf65c2ff5350dba5a492b067b84e05543
-
Size
4.3MB
-
MD5
8cb08968a617438f5c744fa6238d2db2
-
SHA1
dbd71dba2c041bbc8a6304ae7e764297e6b0ee15
-
SHA256
8e43fa9d7abfc68b8e5c786bb50b15abf65c2ff5350dba5a492b067b84e05543
-
SHA512
96a348c0e154d98b19e232dc2d0fa9a67c6645e61656b2c32be66ee05d0dd6e6793b6bbb954b37e2d751a94050160df18a3e7633ae8741b7dbb6c6a8fd7de277
-
SSDEEP
49152:8yuKYDZ0WnCJ+KLmxup4IdGKvghxfki1+PXGIjQRZ8hpTQdcL:X2Z0toK6KckP2iQRZspsdc
Malware Config
Signatures
Files
-
8e43fa9d7abfc68b8e5c786bb50b15abf65c2ff5350dba5a492b067b84e05543.exe windows x86
39228d1d228f54cebd3bf9d13ef87302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WaitForSingleObjectEx
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetProcessHeap
InterlockedCompareExchange
SetLastError
GetVersionExA
GetModuleHandleA
HeapReAlloc
LeaveCriticalSection
DisableThreadLibraryCalls
CreateFileW
VirtualAlloc
VirtualFree
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
EnterCriticalSection
CloseHandle
GetCurrentThreadId
LocalFileTimeToFileTime
ReadFile
GetTickCount
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegEnumKeyExW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyExA
user32
GetWindowRect
CreateWindowExW
GetClientRect
GetWindowTextW
RegisterClassExA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
RegisterClassExW
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RedrawWindow
SetForegroundWindow
PostMessageW
SendMessageA
DefWindowProcA
RegisterWindowMessageW
MessageBoxW
SendMessageW
TrackPopupMenu
ShowWindow
UpdateWindow
FindWindowW
GetParent
LoadIconW
PostMessageA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ