Static task
static1
Behavioral task
behavioral1
Sample
8f2b03b46d1e38b2482d7480965f71b3b272a6a0c6dfa68705cb34731cad78d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f2b03b46d1e38b2482d7480965f71b3b272a6a0c6dfa68705cb34731cad78d8.exe
Resource
win10v2004-20221111-en
General
-
Target
8f2b03b46d1e38b2482d7480965f71b3b272a6a0c6dfa68705cb34731cad78d8
-
Size
1.9MB
-
MD5
e7ac011eb54c82eff036c74455558815
-
SHA1
7a61105eecb584b9562cdb9b8a444bef30d26143
-
SHA256
8f2b03b46d1e38b2482d7480965f71b3b272a6a0c6dfa68705cb34731cad78d8
-
SHA512
82d227ecd0b6381b1aeb733cbf8633001babbca02bc7a938732e2790d98a5ebf5380b726249353484d2a86770e8a6e1f02209757e1406fd4dbdcd366bddcb68a
-
SSDEEP
49152:Y6/uSMtLuXCN+IERuwJ5mYJGvQpzCf6AZI:Y6mSmgIERXJ0OGop2f6qI
Malware Config
Signatures
Files
-
8f2b03b46d1e38b2482d7480965f71b3b272a6a0c6dfa68705cb34731cad78d8.exe windows x86
67846ab310b766a4cb9bd023c2b05cb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
kernel32
GetFileType
user32
GetSysColorBrush
gdi32
SaveDC
winmm
midiStreamRestart
winspool.drv
ClosePrinter
comdlg32
ChooseColorA
advapi32
RegCreateKeyExA
shell32
Shell_NotifyIconA
ole32
CoFreeUnusedLibraries
oleaut32
VariantCopy
comctl32
_TrackMouseEvent
oledlg
ord8
ws2_32
getpeername
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 700KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ