Static task
static1
Behavioral task
behavioral1
Sample
8ebc41f374e7ef39485843d0ce19bb1e95d6635daebbf2505eb2299779191580.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8ebc41f374e7ef39485843d0ce19bb1e95d6635daebbf2505eb2299779191580.exe
Resource
win10v2004-20220812-en
General
-
Target
8ebc41f374e7ef39485843d0ce19bb1e95d6635daebbf2505eb2299779191580
-
Size
157KB
-
MD5
c344082c955e1182ca3a1e89c6d0be74
-
SHA1
bd91a524eeb5bd261b93860e8d26310c6b549fc0
-
SHA256
8ebc41f374e7ef39485843d0ce19bb1e95d6635daebbf2505eb2299779191580
-
SHA512
a2d16fd75fc5fc8bedf5071d9790e4570835e9ba594decd97ebf0155c07e5b70ed9225982f1a4c3ddf4f2b34a73707152344e8ffe0c087f26d6f3dcb5a1fbebb
-
SSDEEP
3072:B5B/Blah397iCOsd1Jz+P3kZ+X1m6e+psMD+OkEF+YAf:B5B/vapp2IJa0aflOM6cF+Y
Malware Config
Signatures
Files
-
8ebc41f374e7ef39485843d0ce19bb1e95d6635daebbf2505eb2299779191580.exe windows x86
910a457f1bf1041a802227ecb1f19ed6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateProcessW
GetModuleFileNameW
HeapAlloc
GetStringTypeW
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RtlUnwind
HeapSize
LCMapStringW
HeapReAlloc
LoadLibraryA
VirtualAlloc
GetFileAttributesA
FindFirstFileA
FindNextFileA
SetFilePointer
GetModuleHandleA
VirtualFree
shlwapi
PathAppendW
PathRemoveFileSpecW
gdi32
PolylineTo
SetArcDirection
SelectObject
SetDIBits
CreateBrushIndirect
oleaut32
SafeArrayAllocDescriptor
SafeArrayDestroy
advapi32
RegOverridePredefKey
GetLengthSid
ole32
CoTreatAsClass
user32
CallNextHookEx
KillTimer
GetMenuItemID
DestroyWindow
PostQuitMessage
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyMenu
CreateWindowExA
SetTimer
GetMenuItemCount
UnhookWindowsHookEx
RegisterClassA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ