Static task
static1
Behavioral task
behavioral1
Sample
8d00941b0a75811e86e38d18d5a8af7207473bcbee20c8d7ada51be59dcba3f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d00941b0a75811e86e38d18d5a8af7207473bcbee20c8d7ada51be59dcba3f1.exe
Resource
win10v2004-20221111-en
General
-
Target
8d00941b0a75811e86e38d18d5a8af7207473bcbee20c8d7ada51be59dcba3f1
-
Size
1.1MB
-
MD5
64317ee001e172990a90a23a870cbd36
-
SHA1
88b21ac5e3efbdc3def8fef4cb3dba1a1f49ebb4
-
SHA256
8d00941b0a75811e86e38d18d5a8af7207473bcbee20c8d7ada51be59dcba3f1
-
SHA512
c555eb584d7277a188b28a8e381c7ea1bb22f4e31c31511b796949fcc095263c5cf98f83a60c95023c2932271f26729ddc077633f61007ac51bc2f1c9174062e
-
SSDEEP
12288:afgyFVFGEpkKPsh/8e8aUt0qUiRcT0x80TGHm2mpKpzoFoKwX1sk9fotYH/2IjfH:ZyQ+kKPeh8TnPupmMzQoZ/9s58h9
Malware Config
Signatures
Files
-
8d00941b0a75811e86e38d18d5a8af7207473bcbee20c8d7ada51be59dcba3f1.exe windows x86
3c935209e1c81f6fa9dce0ff14fe4db4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
OpenMutexA
OpenFileMappingW
DosDateTimeToFileTime
AssignProcessToJobObject
PrepareTape
OpenEventW
Module32Next
CopyFileW
GetVolumeInformationA
GetConsoleCP
GetStringTypeExA
GetLocaleInfoW
Module32NextW
CreateEventA
FormatMessageW
OpenWaitableTimerW
SetThreadPriorityBoost
AreFileApisANSI
GetAtomNameA
BindIoCompletionCallback
EnumCalendarInfoW
GetProfileSectionW
GetVolumeNameForVolumeMountPointA
DebugBreak
GetCurrentThread
GetPrivateProfileSectionNamesA
FindFirstVolumeMountPointA
DnsHostnameToComputerNameA
CreateIoCompletionPort
CreateTapePartition
GetCPInfoExW
GetLongPathNameA
SetFileAttributesW
GetDiskFreeSpaceExW
ReadDirectoryChangesW
GetPrivateProfileSectionA
ChangeTimerQueueTimer
FindFirstFileExA
GetTapeStatus
CreateHardLinkA
GetDevicePowerState
SetConsoleDisplayMode
GetSystemDirectoryA
DeviceIoControl
ProcessIdToSessionId
GetProcessWorkingSetSize
PostQueuedCompletionStatus
GetConsoleAliasesW
CompareStringW
MapUserPhysicalPages
SetCalendarInfoW
SetMailslotInfo
ConvertDefaultLocale
FindResourceExW
GetBinaryTypeA
GetModuleFileNameW
GetCurrentProcess
MapUserPhysicalPagesScatter
GetShortPathNameW
GetExitCodeProcess
IsDBCSLeadByteEx
MoveFileW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
HeapAlloc
HeapSize
RtlUnwind
IsValidCodePage
GetOEMCP
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
WriteFile
DecodePointer
ExitProcess
GetProcAddress
HeapSetInformation
GetCommandLineA
IsProcessorFeaturePresent
GetCompressedFileSizeA
CopyFileA
SetEnvironmentVariableA
FoldStringA
SetUnhandledExceptionFilter
GetCalendarInfoW
GetEnvironmentVariableA
SetProcessWorkingSetSize
SetWaitableTimer
SetThreadExecutionState
GetUserDefaultUILanguage
GetStringTypeW
GetBinaryTypeW
ReplaceFileW
GetDateFormatW
OpenFileMappingA
GetCPInfo
WideCharToMultiByte
GetSystemWindowsDirectoryW
EnumCalendarInfoExA
SearchPathA
GetPriorityClass
OpenEventA
GetProcessAffinityMask
GetNamedPipeHandleStateW
FindFirstFileA
MulDiv
CreateNamedPipeA
GetThreadLocale
GetFileSize
ResetWriteWatch
CreateFileW
CopyFileExA
LCMapStringA
GetConsoleAliasExesLengthW
GetProcessVersion
SetErrorMode
GetLogicalDriveStringsW
lstrcatA
MoveFileWithProgressW
GetLongPathNameW
SetThreadIdealProcessor
CreateTimerQueue
FindResourceExA
GetProcessTimes
FindAtomA
SetLocaleInfoA
GetThreadPriority
CreateDirectoryW
CreateDirectoryExA
GetCompressedFileSizeW
FoldStringW
GetACP
GetLogicalDrives
SetFileTime
GetShortPathNameA
FreeEnvironmentStringsW
GetModuleHandleW
FlushFileBuffers
SetStdHandle
FindNextChangeNotification
CreateMailslotW
FlushConsoleInputBuffer
DeleteTimerQueue
SwitchToThread
FreeConsole
GetEnvironmentStrings
GetProfileIntA
GetFullPathNameW
GetWindowsDirectoryA
GetPrivateProfileStructW
OpenJobObjectW
GetVolumePathNameW
SetThreadAffinityMask
GetConsoleMode
GetDiskFreeSpaceA
VirtualAlloc
Toolhelp32ReadProcessMemory
GetProfileStringA
GetThreadContext
SetVolumeMountPointA
OpenJobObjectA
DuplicateHandle
GetEnvironmentVariableW
GetVersion
user32
UnregisterClassW
CharPrevW
CharNextW
WinHelpW
GetClassLongW
SetDlgItemTextA
GetAltTabInfoA
GetUserObjectInformationW
DialogBoxIndirectParamW
InflateRect
EnumWindows
GetSysColorBrush
FindWindowW
IsChild
CloseDesktop
DeleteMenu
GetCursorPos
GetLastActivePopup
PostQuitMessage
LoadImageW
SetCapture
CharLowerA
SetWindowLongA
GetWindowTextLengthW
GetDC
ExitWindowsEx
SystemParametersInfoA
GetMessageTime
ReleaseDC
SetWindowsHookExA
CreateDialogParamW
CharUpperW
DefWindowProcA
EnableWindow
IsDlgButtonChecked
InvalidateRgn
CharToOemA
InsertMenuW
OpenInputDesktop
SendDlgItemMessageA
EndDeferWindowPos
IsDialogMessageA
SetWindowPos
OpenDesktopW
SetMenu
MapWindowPoints
DialogBoxParamW
PostMessageA
ChildWindowFromPoint
LoadBitmapW
SetWindowTextW
CreateAcceleratorTableW
LoadImageA
GetFocus
LoadIconA
DrawFocusRect
CallWindowProcW
comctl32
ImageList_GetImageInfo
ImageList_SetOverlayImage
ImageList_GetImageCount
ImageList_EndDrag
PropertySheetA
ImageList_DrawEx
ImageList_DragLeave
DestroyPropertySheetPage
ImageList_DragMove
ImageList_GetDragImage
ImageList_AddMasked
ImageList_Destroy
ImageList_Remove
ImageList_Draw
FlatSB_GetScrollPos
ord17
CreateToolbarEx
advapi32
GetSidSubAuthority
CreateWellKnownSid
CreateProcessAsUserW
RegQueryValueExA
RegSetValueW
CryptAcquireContextW
AddAccessDeniedAce
InitializeSecurityDescriptor
GetKernelObjectSecurity
StartServiceW
QueryServiceStatus
RegQueryMultipleValuesA
RegDeleteValueA
GetCurrentHwProfileW
RegEnumValueA
ControlService
RegConnectRegistryW
CryptHashData
IsValidSid
GetUserNameW
GetSecurityDescriptorControl
CryptDestroyKey
EqualSid
GetAce
RegEnumKeyExW
CryptDestroyHash
GetSecurityDescriptorLength
LsaClose
RegOpenKeyExW
CryptReleaseContext
SetThreadToken
GetAclInformation
LookupAccountSidW
GetSecurityDescriptorSacl
SetEntriesInAclW
RegQueryInfoKeyW
CheckTokenMembership
RegQueryValueExW
MakeSelfRelativeSD
OpenProcessToken
RegCloseKey
IsValidSecurityDescriptor
DuplicateTokenEx
CloseServiceHandle
RegCreateKeyA
AreAnyAccessesGranted
AddAccessAllowedAce
SetTokenInformation
AreAllAccessesGranted
GetTokenInformation
RegCreateKeyExA
GetSidLengthRequired
AddAuditAccessAce
SetKernelObjectSecurity
RegSetValueExW
RegNotifyChangeKeyValue
RegSetValueA
RegSetKeySecurity
GetCurrentHwProfileA
RegQueryMultipleValuesW
RegSetValueExA
GetSidIdentifierAuthority
GetSidSubAuthorityCount
RegCreateKeyExW
InitializeAcl
OpenServiceA
ole32
HICON_UserSize
HGLOBAL_UserSize
CoResumeClassObjects
IIDFromString
HACCEL_UserFree
StgCreateDocfileOnILockBytes
StringFromGUID2
CLIPFORMAT_UserUnmarshal
CoFreeLibrary
OleRegEnumFormatEtc
CoInitializeEx
HWND_UserUnmarshal
OleGetClipboard
CoCopyProxy
DcomChannelSetHResult
OleRegGetUserType
OleNoteObjectVisible
OleFlushClipboard
CoGetStandardMarshal
StgIsStorageILockBytes
StgOpenPropStg
CoRegisterPSClsid
HDC_UserMarshal
RegisterDragDrop
CoRegisterInitializeSpy
OleSetContainedObject
HWND_UserMarshal
CoRegisterClassObject
CoCreateInstanceEx
CLIPFORMAT_UserSize
OleInitialize
PropVariantCopy
CoFreeUnusedLibraries
HICON_UserFree
MkParseDisplayName
CoRegisterMessageFilter
CoCancelCall
CoCreateInstance
CoInvalidateRemoteMachineBindings
OleRegEnumVerbs
CoInitializeSecurity
CreateStreamOnHGlobal
CoTreatAsClass
CoWaitForMultipleHandles
OleDestroyMenuDescriptor
HDC_UserFree
WriteFmtUserTypeStg
StgCreatePropSetStg
CoAddRefServerProcess
CoDosDateTimeToFileTime
OleLockRunning
CLIPFORMAT_UserMarshal
CLSIDFromProgID
HWND_UserFree
ReleaseStgMedium
Sections
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 87KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 355KB - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ