Static task
static1
Behavioral task
behavioral1
Sample
8a870c43eff72888d09e7cf117b648c1ed45c89df2d3ec6961d821f54a8a21a3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a870c43eff72888d09e7cf117b648c1ed45c89df2d3ec6961d821f54a8a21a3.exe
Resource
win10v2004-20221111-en
General
-
Target
8a870c43eff72888d09e7cf117b648c1ed45c89df2d3ec6961d821f54a8a21a3
-
Size
708KB
-
MD5
c5dfdef6eb8a325365ba846c0706e922
-
SHA1
6ec6bc1f7079a01a4c0efa3d5d7d36b54c917e2b
-
SHA256
8a870c43eff72888d09e7cf117b648c1ed45c89df2d3ec6961d821f54a8a21a3
-
SHA512
abf88bb34ebdb6caa896fbac959d020656534dd9c77862d3403d8f5be159a45cbf3f1345064ed38dff30811eee937588c29bae10434e60145ec6d4784060ef51
-
SSDEEP
12288:cBuWTYWHBg05IpNwKd+DZhFjBiMPtU7Zri7O0PsI6Q/02Lt7nJSXYx9aD:cBuWBgrB+xBqFri60J6Q8A7nJSX3
Malware Config
Signatures
Files
-
8a870c43eff72888d09e7cf117b648c1ed45c89df2d3ec6961d821f54a8a21a3.exe windows x86
7d29fcae7c4d6c34ce648417cb1de8e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
SetScrollPos
GetMessageTime
GetDlgItemInt
PostMessageW
LoadCursorW
CreateWindowExW
TranslateMessage
RegisterClassExW
GetNextDlgGroupItem
EndDialog
GetWindowTextLengthW
GetSysColor
RegisterClassW
UnhookWindowsHookEx
GetScrollPos
SetWindowsHookExW
UnregisterClassW
CreateDialogIndirectParamW
TrackPopupMenu
SetCapture
MessageBoxW
GetClientRect
SetCursor
EnableWindow
GetSubMenu
GetMenuItemInfoW
DefWindowProcW
SystemParametersInfoW
DrawStateW
IsWindow
MessageBeep
WinHelpW
DestroyWindow
DestroyIcon
CreatePopupMenu
GetMenuItemCount
ClientToScreen
SetForegroundWindow
TranslateAcceleratorW
DrawFrameControl
DrawTextExW
GetCursorPos
ReleaseCapture
CallWindowProcW
SetWindowLongW
SendMessageW
SetActiveWindow
SetWindowTextW
SetWindowRgn
ScreenToClient
SendDlgItemMessageA
GetForegroundWindow
SetDlgItemTextW
IsZoomed
IsDialogMessageW
LockWindowUpdate
GetWindowTextW
IsWindowVisible
KillTimer
AppendMenuW
GetMessagePos
GetWindowThreadProcessId
DestroyCursor
SetRectEmpty
GetClassLongW
DrawMenuBar
GetActiveWindow
IsWindowEnabled
GetWindow
SendDlgItemMessageW
IntersectRect
CallNextHookEx
PostQuitMessage
RedrawWindow
shlwapi
PathFindExtensionW
PathStripToRootW
comdlg32
PrintDlgA
CommDlgExtendedError
GetOpenFileNameA
GetFileTitleA
kernel32
lstrcpyA
HeapFree
GlobalUnlock
FileTimeToLocalFileTime
FreeEnvironmentStringsW
VirtualFree
SetFilePointer
GetVersionExA
GetFileType
GetExitCodeProcess
FormatMessageW
IsValidCodePage
GetConsoleCP
GetEnvironmentStrings
GetModuleHandleW
GlobalFree
GetSystemTimeAsFileTime
LCMapStringA
GetCurrentProcess
GetOEMCP
IsBadWritePtr
ExitThread
CreateMutexW
GetProcAddress
GetThreadLocale
LCMapStringW
IsValidLocale
FindNextFileW
GetCurrentProcessId
FindClose
GlobalHandle
EnterCriticalSection
VirtualAlloc
GetFileAttributesA
ExitProcess
TlsGetValue
HeapDestroy
GetStartupInfoW
FreeResource
UnhandledExceptionFilter
GlobalLock
GetACP
SetFileTime
QueryPerformanceCounter
GetVersionExW
lstrcmpiW
LocalFree
GetLocaleInfoW
LeaveCriticalSection
LockResource
SetEndOfFile
DeleteCriticalSection
InterlockedIncrement
GetVersion
HeapSize
WriteConsoleW
RaiseException
GetLocalTime
GetCurrentThread
SetStdHandle
TlsFree
GetTimeZoneInformation
lstrlenA
FreeEnvironmentStringsA
InterlockedCompareExchange
GetProcessHeap
VirtualQuery
DeleteFileA
CompareFileTime
SetUnhandledExceptionFilter
WriteFile
HeapReAlloc
Sleep
FreeLibrary
VirtualProtect
lstrcmpA
FileTimeToSystemTime
TlsAlloc
MultiByteToWideChar
GetFileTime
SetLastError
GetTickCount
GetCommandLineW
ReadFile
CopyFileW
lstrlenW
GetModuleFileNameA
GetSystemDirectoryA
FlushInstructionCache
SystemTimeToFileTime
CreateFileA
FindFirstFileA
FindFirstFileW
GetCurrentDirectoryA
GetStartupInfoA
WideCharToMultiByte
TlsSetValue
DuplicateHandle
DeleteFileW
LoadLibraryA
InterlockedDecrement
FlushFileBuffers
SizeofResource
GetFullPathNameW
FormatMessageA
GetUserDefaultLCID
RtlUnwind
CreateDirectoryA
GetLastError
WaitForSingleObject
SetHandleCount
CreateThread
SetCurrentDirectoryA
GetModuleHandleA
InterlockedExchange
SuspendThread
GetStdHandle
SetErrorMode
GlobalAlloc
HeapAlloc
GetTempPathA
GlobalReAlloc
GetModuleFileNameW
FatalAppExitA
GetConsoleMode
GetStringTypeA
GetDateFormatA
UnmapViewOfFile
GetConsoleOutputCP
OutputDebugStringW
GetDriveTypeA
IsDebuggerPresent
GetEnvironmentStringsW
WriteConsoleA
GetFileSize
GetCommandLineA
InitializeCriticalSection
GetLocaleInfoA
CreateFileW
SetThreadPriority
GetStringTypeW
MapViewOfFile
LoadResource
GetSystemInfo
CompareStringA
GlobalFlags
TerminateProcess
CompareStringW
LocalFileTimeToFileTime
GetTimeFormatA
GetCPInfo
HeapCreate
LocalReAlloc
GetCurrentThreadId
GetFullPathNameA
MulDiv
CloseHandle
SetEnvironmentVariableA
mfc42
ord1576
shell32
SHBrowseForFolderA
SHGetMalloc
ExtractIconA
ShellExecuteA
SHGetDesktopFolder
DragAcceptFiles
ShellExecuteExA
ord155
DragQueryFileA
SHGetPathFromIDListA
ExtractIconExA
SHGetFileInfoA
comctl32
ImageList_Create
ImageList_GetIcon
_TrackMouseEvent
InitCommonControlsEx
ImageList_DrawEx
ord17
PropertySheetA
ImageList_GetImageInfo
advapi32
DeleteService
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegFlushKey
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ