Static task
static1
Behavioral task
behavioral1
Sample
8f7f3f52821fee8529d2413a60aa3d5a1fa3a35b6b119e02e451a464b5d7f95a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f7f3f52821fee8529d2413a60aa3d5a1fa3a35b6b119e02e451a464b5d7f95a.exe
Resource
win10v2004-20221111-en
General
-
Target
8f7f3f52821fee8529d2413a60aa3d5a1fa3a35b6b119e02e451a464b5d7f95a
-
Size
250KB
-
MD5
7cb601402167af14895eeb1d6f779bb3
-
SHA1
ae76971d34cc676bbfec7ba7244f40982bad4fc5
-
SHA256
8f7f3f52821fee8529d2413a60aa3d5a1fa3a35b6b119e02e451a464b5d7f95a
-
SHA512
3b2c60d2bb6991cbf49c528c37ff60e66a19bb6a8c4455a18f63e143ebbe118b75ba4d752f1abe71d2a383ceb0fdaed833ea61af0289a5f781a02746a2a3c560
-
SSDEEP
6144:1XbOBe0cY0J3KFBx6o9n9AVpDn65ggAR1asUwEqtDOCi7Q+LZq:CDcY0dABx6in9ASBAnas3EqUm+
Malware Config
Signatures
Files
-
8f7f3f52821fee8529d2413a60aa3d5a1fa3a35b6b119e02e451a464b5d7f95a.exe windows x86
58a29f0e270fe493c531fe514233f5d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoFileTimeNow
CoGetClassObject
ws2_32
WSAAddressToStringW
WSANtohs
getsockopt
WSAAsyncGetProtoByNumber
WSALookupServiceNextA
WSASetServiceW
WSAAsyncGetServByName
WSALookupServiceBeginW
recv
WSASendTo
WSAStringToAddressA
oleaut32
SysFreeString
LoadTypeLi
SetErrorInfo
SafeArrayCreate
SysStringLen
QueryPathOfRegTypeLi
user32
InvalidateRect
CharNextW
CharLowerA
TabbedTextOutA
SetCaretPos
IsWindowEnabled
GetInputState
AppendMenuW
GetWindow
GetClipboardSequenceNumber
PeekMessageA
MonitorFromWindow
GetNextDlgGroupItem
CascadeWindows
InvalidateRgn
CopyAcceleratorTableW
ChangeClipboardChain
DefFrameProcA
CharUpperW
VkKeyScanW
version
VerInstallFileA
advapi32
GetSidSubAuthorityCount
GetSecurityDescriptorControl
SetFileSecurityA
SetSecurityDescriptorSacl
RegOpenKeyExA
RegOpenKeyW
GetSidIdentifierAuthority
GetSecurityDescriptorDacl
CryptImportKey
GetServiceKeyNameW
EnumServicesStatusA
RegQueryValueW
DeleteService
LookupAccountSidW
ControlService
AllocateLocallyUniqueId
RegSaveKeyA
ImpersonateLoggedOnUser
DeregisterEventSource
RegConnectRegistryA
LookupAccountSidA
GetSidSubAuthority
GetUserNameA
RegDeleteKeyA
SetServiceStatus
ImpersonateSelf
RegisterEventSourceA
AddAccessAllowedAce
RegConnectRegistryW
CryptAcquireContextA
RegQueryValueA
RegEnumKeyExW
CryptGetKeyParam
RegCreateKeyExW
RegDeleteValueA
CryptExportKey
RegSetKeySecurity
SetSecurityDescriptorDacl
RegSetValueA
AbortSystemShutdownA
kernel32
RaiseException
GetCPInfo
ReadConsoleInputW
GetTickCount
GlobalFindAtomW
lstrcmpA
SetConsoleOutputCP
_lread
FreeEnvironmentStringsA
GetDateFormatA
SetCurrentDirectoryA
LCMapStringA
LoadLibraryExW
SetNamedPipeHandleState
CloseHandle
IsProcessorFeaturePresent
IsBadStringPtrA
ReleaseSemaphore
WriteProcessMemory
GetTapeParameters
OutputDebugStringA
GetSystemTime
SetMailslotInfo
GetSystemTimeAdjustment
GetFileType
SetEvent
EnumDateFormatsW
ConnectNamedPipe
GetPrivateProfileStringW
lstrcpynA
GlobalAddAtomA
TlsGetValue
_lclose
GetUserDefaultLCID
lstrcmpiA
FindCloseChangeNotification
GlobalFlags
OutputDebugStringW
VirtualAlloc
GetVersion
GetModuleHandleA
QueryDosDeviceW
GetThreadContext
SetupComm
GetLocaleInfoW
EnumCalendarInfoW
GetConsoleMode
SetVolumeLabelA
GetStartupInfoA
VirtualAllocEx
SetStdHandle
SetConsoleMode
WritePrivateProfileStringA
DuplicateHandle
SetThreadAffinityMask
GetThreadPriority
gdi32
GetTextExtentPointA
CreateHalftonePalette
PolylineTo
SaveDC
GetEnhMetaFileBits
comdlg32
ChooseColorW
ReplaceTextA
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
malloc
strcspn
_mbschr
_ismbblead
wcstod
putc
tmpnam
_eof
_mbctoupper
_locking
_mbslen
_wsplitpath
_wcsnset
_isatty
swprintf
_access
_chdir
strspn
_wgetenv
_mbsrchr
isprint
fscanf
_mbsupr
_unlink
_ltow
_controlfp
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE