Static task
static1
Behavioral task
behavioral1
Sample
8b4b20491c09ecb931352a9118b2cbcad804f712c7afdcfc165b82caf6653c6c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b4b20491c09ecb931352a9118b2cbcad804f712c7afdcfc165b82caf6653c6c.exe
Resource
win10v2004-20220812-en
General
-
Target
8b4b20491c09ecb931352a9118b2cbcad804f712c7afdcfc165b82caf6653c6c
-
Size
23KB
-
MD5
4a7f76d6b7d45ff4febfc67ba74a4e69
-
SHA1
e5383d8ffb3d22819738dc8e199e34fd7350e555
-
SHA256
8b4b20491c09ecb931352a9118b2cbcad804f712c7afdcfc165b82caf6653c6c
-
SHA512
e71d123da3e7588361450abde637655808c5319ea7fcc6091427846dea4b32dc40e2c2627b6e5ba7bfe3537e53dc186a6d579abaa7f26949087ff7a07a54f202
-
SSDEEP
384:33AhVC2PJ6wRC8vPpMiuMZkVo+Tbd8IJe68tOHj2u:nCLP5uK69LJUtO7
Malware Config
Signatures
Files
-
8b4b20491c09ecb931352a9118b2cbcad804f712c7afdcfc165b82caf6653c6c.exe windows x86
1fb57b3425048683d2b780e925e7835f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
SendMessageA
DestroyWindow
DefWindowProcA
PostMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
kernel32
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapReAlloc
InterlockedExchange
ExitProcess
GetModuleHandleW
GetModuleHandleA
GetTickCount
HeapFree
RaiseException
RtlUnwind
lstrcpynA
LoadLibraryA
LCMapStringA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
comctl32
ord17
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ