Static task
static1
Behavioral task
behavioral1
Sample
8c5f64c6aecd60d3ad3adbb30c6590e2cb953bdce4e3af58d65e65a983024a10.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c5f64c6aecd60d3ad3adbb30c6590e2cb953bdce4e3af58d65e65a983024a10.exe
Resource
win10v2004-20221111-en
General
-
Target
8c5f64c6aecd60d3ad3adbb30c6590e2cb953bdce4e3af58d65e65a983024a10
-
Size
2.8MB
-
MD5
b0ac22ca34dcc20c73a3efc307ae4e58
-
SHA1
104005075f0b6a7f721547a15e8075f477bf5db4
-
SHA256
8c5f64c6aecd60d3ad3adbb30c6590e2cb953bdce4e3af58d65e65a983024a10
-
SHA512
c07722f7a30f5ac864de29033348ba4a98b4e0b0a3241915ef04ec658f596e0d5c062ab51b41e5c6fefd6d385ec8ac93855094186ce64c65357a73e3a87d31b3
-
SSDEEP
12288:4oYj7KXxbLME3qBQC8x1yo3scNbPdEnpM9:4ojXFJaBQ9l9TdEpM9
Malware Config
Signatures
Files
-
8c5f64c6aecd60d3ad3adbb30c6590e2cb953bdce4e3af58d65e65a983024a10.exe windows x86
712b6f815005ba4717cdad7a2c69f468
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msimg32
GradientFill
kernel32
CreateMutexA
FindResourceA
FreeResource
LoadResource
SizeofResource
GetFileAttributesA
LockResource
OutputDebugStringA
DosDateTimeToFileTime
CreateFileA
SetFilePointer
SystemTimeToFileTime
SetFileTime
WriteFile
ReadFile
GetFileType
GetCurrentDirectoryW
GetFullPathNameA
GetDriveTypeW
CreateFileW
FlushFileBuffers
GetLastError
WriteConsoleW
SetStdHandle
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsProcessorFeaturePresent
HeapCreate
LCMapStringW
IsValidCodePage
GetOEMCP
GetCPInfo
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetACP
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
CloseHandle
WinExec
GetModuleFileNameA
GetModuleHandleA
WritePrivateProfileStringA
GetLocalTime
GetPrivateProfileStringA
SetFileAttributesA
CreateDirectoryA
TerminateProcess
Sleep
OpenProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetStdHandle
GetCurrentThreadId
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
user32
MoveWindow
GetDlgCtrlID
FindWindowA
UpdateWindow
LoadImageA
GetSystemMetrics
DispatchMessageA
WindowFromDC
ShowWindow
SetLayeredWindowAttributes
SetWindowPos
GetDlgItem
InvalidateRect
TranslateMessage
BeginPaint
SendMessageA
GetClientRect
LoadBitmapA
DrawTextA
KillTimer
PostQuitMessage
CreateDialogParamA
GetWindowRect
SetTimer
GetMessageA
DestroyWindow
PostMessageA
wvsprintfA
EndPaint
gdi32
SetTextColor
DeleteDC
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetStockObject
BitBlt
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
shell32
SHCreateDirectoryExA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
gdiplus
GdiplusStartup
shlwapi
PathStripPathA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ