Static task
static1
Behavioral task
behavioral1
Sample
8ac6cc67e7e53ec7e14bad440d738b4d2d5b5b326ea316b33d32a6ab7ee1a1b7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8ac6cc67e7e53ec7e14bad440d738b4d2d5b5b326ea316b33d32a6ab7ee1a1b7.exe
Resource
win10v2004-20221111-en
General
-
Target
8ac6cc67e7e53ec7e14bad440d738b4d2d5b5b326ea316b33d32a6ab7ee1a1b7
-
Size
227KB
-
MD5
50f74559e87c60089d8e00fd74b1adea
-
SHA1
5339d8dc2cd7b980b207511486a9fa0aa22d74ad
-
SHA256
8ac6cc67e7e53ec7e14bad440d738b4d2d5b5b326ea316b33d32a6ab7ee1a1b7
-
SHA512
3a091905902f208bc357e1ba4db8f2c9c43883b55025688c621509c18b208d93809606c3930146bce5c8dcdd716929a30155cc8276a0b94f1ecca718d6fac7be
-
SSDEEP
6144:NMKiCfj619ASresJtHjkvYfjbme5JzbijG:G476vnreQjkgfvmYz
Malware Config
Signatures
Files
-
8ac6cc67e7e53ec7e14bad440d738b4d2d5b5b326ea316b33d32a6ab7ee1a1b7.exe windows x86
0458674fd82b92472e5d795e7195d0f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
InternalExtractIconListA
ExtractAssociatedIconA
SHGetPathFromIDListA
SHGetFileInfoA
ExtractAssociatedIconW
ExtractAssociatedIconExA
SHFormatDrive
SheSetCurDrive
advapi32
CryptImportKey
CryptEnumProviderTypesA
RegEnumKeyExW
LookupPrivilegeNameW
DuplicateToken
CryptGetKeyParam
LookupPrivilegeValueW
CryptExportKey
AbortSystemShutdownW
CryptEnumProviderTypesW
RegSetValueExW
RevertToSelf
RegEnumKeyA
LookupPrivilegeNameA
CreateServiceA
CryptDecrypt
gdi32
PolyBezier
GetClipBox
FlattenPath
CreateHatchBrush
CreateCompatibleDC
GetEnhMetaFileDescriptionA
SetICMProfileW
GetPixelFormat
GetMapMode
GetStretchBltMode
SetGraphicsMode
GetCurrentPositionEx
EndDoc
GetTextFaceA
CreateDCW
SetBitmapBits
SetMiterLimit
GetGlyphOutlineA
EnableEUDC
SetMapMode
SetAbortProc
PolyTextOutA
SelectClipPath
SetFontEnumeration
user32
WindowFromDC
ChangeMenuW
CharToOemW
CallMsgFilterA
GetWindowLongA
IsDlgButtonChecked
GetDlgItemInt
GetForegroundWindow
SetKeyboardState
GetUpdateRect
kernel32
VirtualQuery
TlsAlloc
HeapFree
EnumTimeFormatsA
SetCurrentDirectoryA
GetCurrentThread
TerminateProcess
CreateThread
GetCommandLineA
SystemTimeToFileTime
GetVersion
GetCommandLineW
FindAtomA
FormatMessageA
GetEnvironmentStringsW
SetLastError
GetProcAddress
GetProcessHeaps
HeapCreate
EnterCriticalSection
IsBadWritePtr
GetFileType
CreateFileMappingW
GetStdHandle
GetConsoleScreenBufferInfo
TlsGetValue
GetLastError
QueryPerformanceCounter
GetCurrentProcess
GetTickCount
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetModuleHandleA
SetHandleCount
LocalHandle
VirtualFree
LocalFileTimeToFileTime
HeapAlloc
GetPrivateProfileIntA
MultiByteToWideChar
ReadConsoleA
WaitForDebugEvent
HeapReAlloc
TlsSetValue
WriteFile
GetCurrentDirectoryA
GetEnvironmentStrings
InitializeCriticalSection
GlobalSize
LeaveCriticalSection
GetNumberFormatW
GetModuleFileNameW
GetStartupInfoW
LoadLibraryA
DeleteCriticalSection
GetCurrentProcessId
FreeEnvironmentStringsA
CreateDirectoryExW
GetLocaleInfoA
GetModuleFileNameA
FormatMessageW
GetDateFormatW
GetCurrentThreadId
InterlockedExchange
RtlUnwind
GetStartupInfoA
HeapDestroy
GetSystemTimeAsFileTime
InterlockedIncrement
VirtualAlloc
TlsFree
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ