Static task
static1
Behavioral task
behavioral1
Sample
8611058ed1f312a4bca3bbfe28c9a9d887a8494c12468c4320cc365dd91f1a3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8611058ed1f312a4bca3bbfe28c9a9d887a8494c12468c4320cc365dd91f1a3b.exe
Resource
win10v2004-20221111-en
General
-
Target
8611058ed1f312a4bca3bbfe28c9a9d887a8494c12468c4320cc365dd91f1a3b
-
Size
109KB
-
MD5
993719fa732f8fecc5a13524e01ec212
-
SHA1
cdc70fe14a4872de6d48ccf995cae4762424b0f7
-
SHA256
8611058ed1f312a4bca3bbfe28c9a9d887a8494c12468c4320cc365dd91f1a3b
-
SHA512
0f3d6bb8bb677d5289b211d9b2ef4f0c9689afc53325a110b14d1af6fb16bf822491c125cafc2bff8708c61dc17e4a2abe9ee47b63e520364692daf863c40dfd
-
SSDEEP
3072:dTLBiOHZgip+JLojs46sW2ZoWGhIHwvK/oSRJc:dXBNgi19V2IHwvGoyJ
Malware Config
Signatures
Files
-
8611058ed1f312a4bca3bbfe28c9a9d887a8494c12468c4320cc365dd91f1a3b.exe windows x86
9bd6d275ea36ab6a59713c625700cfdb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GetSystemTime
ExitProcess
GetLocalTime
GetModuleHandleA
VirtualAlloc
GetStartupInfoW
CreateFileW
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GetProcAddress
GetVersionExA
user32
ReleaseDC
GetClientRect
GetDC
gdi32
CreateCompatibleDC
GetObjectA
DeleteObject
SetPixelFormat
ChoosePixelFormat
SelectObject
opengl32
wglDeleteContext
wglCreateContext
msi
ord8
ord94
msvcrt
_exit
_XcptFilter
_cexit
_c_exit
memset
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__dllonexit
_onexit
_except_handler3
exit
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ