Static task
static1
Behavioral task
behavioral1
Sample
8f2a103c47de22f189b5f216ace9b674cfaef41971ea37480a9a0f0c6dbd5a34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f2a103c47de22f189b5f216ace9b674cfaef41971ea37480a9a0f0c6dbd5a34.exe
Resource
win10v2004-20220901-en
General
-
Target
8f2a103c47de22f189b5f216ace9b674cfaef41971ea37480a9a0f0c6dbd5a34
-
Size
710KB
-
MD5
da774e8e237e52ddaebd4e6a61439780
-
SHA1
5293332a8516b193a562bf29bf189348da351e1a
-
SHA256
8f2a103c47de22f189b5f216ace9b674cfaef41971ea37480a9a0f0c6dbd5a34
-
SHA512
c31275ae44f6af4c0f9977250b0d50ddb491fe8b6614610dba730079d99a0d99e72871dff7524e6a25e6b5022632cd695d20f5ab48fda5ce0a9cf22af6eb7d64
-
SSDEEP
12288:IfKcPm/4SCrAZ4Qz0uQSf23mlYzeH3LiteeN67uJTHLdEStAvzTaMJyDh0xhA:IfKcNrAZhzXvH7iteeU7YrdrtgzTaMJM
Malware Config
Signatures
Files
-
8f2a103c47de22f189b5f216ace9b674cfaef41971ea37480a9a0f0c6dbd5a34.exe windows x86
bccbdcfd22276acf22fe308f7326d80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
IsBadCodePtr
GetComputerNameExW
GetAtomNameW
GlobalAddAtomA
CreateSemaphoreW
ConnectNamedPipe
FindClose
SetVolumeLabelA
CreateTimerQueueTimer
_lread
MoveFileExA
GetThreadTimes
FindNextVolumeMountPointW
DuplicateHandle
MapViewOfFile
GetDiskFreeSpaceW
SetFilePointer
lstrcmpW
UnhandledExceptionFilter
FreeUserPhysicalPages
GetShortPathNameW
SetWaitableTimer
GetFileSizeEx
GetPrivateProfileSectionNamesW
DeleteTimerQueue
FreeEnvironmentStringsW
CreateFileMappingW
SuspendThread
SetSystemTime
CancelWaitableTimer
EscapeCommFunction
EnumUILanguagesA
SetEnvironmentVariableA
WideCharToMultiByte
ChangeTimerQueueTimer
GetCalendarInfoW
LCMapStringA
FindAtomW
GetCurrentThreadId
GetCommMask
_lclose
SetFileAttributesA
FindFirstFileA
GetSystemTimeAdjustment
FindResourceExA
_lwrite
DefineDosDeviceA
BackupSeek
lstrcpynW
SetTapeParameters
IsValidCodePage
GetStringTypeExA
LocalFlags
SetFileAttributesW
IsBadWritePtr
GlobalFree
EnumResourceLanguagesA
GetSystemTime
RemoveDirectoryW
IsValidLanguageGroup
GetVolumeInformationA
EnumResourceNamesW
SetDefaultCommConfigW
IsValidLocale
FindNextVolumeA
lstrcpyW
lstrcpynA
InterlockedIncrement
MoveFileExW
WritePrivateProfileStructA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetFileAttributesW
CreateEventW
GetSystemPowerStatus
IsBadStringPtrA
WritePrivateProfileStringA
SetSystemPowerState
EnumTimeFormatsW
CreateWaitableTimerA
GetCommModemStatus
GetPrivateProfileSectionW
GetCPInfoExW
SetMailslotInfo
GetShortPathNameA
ConvertDefaultLocale
GetPrivateProfileIntW
GetPrivateProfileStringW
GetExitCodeThread
GetWindowsDirectoryW
GetNamedPipeHandleStateW
FatalAppExitA
SetLocaleInfoA
LocalAlloc
GetProcessPriorityBoost
WritePrivateProfileStructW
UpdateResourceA
GetDateFormatW
GlobalGetAtomNameW
QueryPerformanceCounter
UnmapViewOfFile
InterlockedDecrement
GetProfileIntW
GetCPInfo
GetFileTime
GetFileAttributesA
GetDevicePowerState
GetCalendarInfoA
EndUpdateResourceW
GetAtomNameA
shlwapi
PathAppendA
user32
DialogBoxIndirectParamW
DrawAnimatedRects
SetMenuItemInfoA
SetDlgItemTextW
MessageBoxExA
SetActiveWindow
UpdateWindow
CharLowerBuffA
SendMessageCallbackW
RegisterDeviceNotificationW
EnumChildWindows
GetWindowLongA
SetParent
FillRect
MapDialogRect
DlgDirListW
SetThreadDesktop
TrackMouseEvent
GetDesktopWindow
SetWindowContextHelpId
DestroyWindow
GetMenuBarInfo
GetDialogBaseUnits
SetDebugErrorLevel
LoadMenuA
DdeClientTransaction
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ