Static task
static1
Behavioral task
behavioral1
Sample
08e309b8455ad1b126b299d036e4be4d7b0b1ef90cd1686158c179473c58f18f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08e309b8455ad1b126b299d036e4be4d7b0b1ef90cd1686158c179473c58f18f.exe
Resource
win10v2004-20220901-en
General
-
Target
08e309b8455ad1b126b299d036e4be4d7b0b1ef90cd1686158c179473c58f18f
-
Size
342KB
-
MD5
78c48ded24756fcdce2ca2d2e2da5517
-
SHA1
ecada10ca114c383beaa6309b67f4db6507928ac
-
SHA256
08e309b8455ad1b126b299d036e4be4d7b0b1ef90cd1686158c179473c58f18f
-
SHA512
d41759e458906a7b72651143ea234422fad1ea124d6b269d272163b5bf3623bc4cdd39e0ace2ce27834a951089cf2c460ef1f7df9e7e733d7c32f8efd40f2197
-
SSDEEP
6144:NHiIzxi8LHfL8zo2VwGCnSKc0+NDdxnpIns:jti87fL8zo7z+xx9
Malware Config
Signatures
Files
-
08e309b8455ad1b126b299d036e4be4d7b0b1ef90cd1686158c179473c58f18f.exe windows x86
840230e9c61402ea6aea49ea59c8741f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
FreeLibrary
CreateFileW
GetFileSize
ReadFile
GetTickCount
FindFirstFileW
FindClose
CreateDirectoryW
SetFilePointer
GetCurrentProcess
VirtualAlloc
GetThreadContext
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
VirtualAllocEx
CloseHandle
SetThreadContext
GetCurrentDirectoryW
TerminateProcess
VirtualFree
HeapAlloc
HeapFree
CreateProcessW
WriteFile
SystemTimeToFileTime
LocalFileTimeToFileTime
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapReAlloc
HeapSize
Sleep
MoveFileW
FindResourceExW
FindResourceW
SizeofResource
LockResource
GetPrivateProfileIntW
DeleteFileW
SetFileAttributesW
GetSystemDirectoryW
CreateMutexW
SetUnhandledExceptionFilter
GetModuleFileNameW
GetProcessHeap
SetCurrentDirectoryW
ResumeThread
GetModuleHandleW
LoadResource
WriteProcessMemory
GetLastError
GetVersionExA
GlobalMemoryStatus
GetModuleHandleA
GetVersion
GetStartupInfoW
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CreateFileA
user32
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
MessageBoxA
wsprintfW
advapi32
DeregisterEventSource
RegisterEventSourceA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ReportEventA
shlwapi
StrStrIW
PathFileExistsW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetOpenW
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ