Static task
static1
Behavioral task
behavioral1
Sample
8d74f1e5df4ccebb87107961b96f6ff952909c48f5d049d051bdeaf957b47597.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d74f1e5df4ccebb87107961b96f6ff952909c48f5d049d051bdeaf957b47597.exe
Resource
win10v2004-20220812-en
General
-
Target
8d74f1e5df4ccebb87107961b96f6ff952909c48f5d049d051bdeaf957b47597
-
Size
44KB
-
MD5
ebb561bda69f354b0b26b3d693eb1c40
-
SHA1
1c99433dbbe9a4c1ea5fb4d49f77f9a5d063dc14
-
SHA256
8d74f1e5df4ccebb87107961b96f6ff952909c48f5d049d051bdeaf957b47597
-
SHA512
17798037b742f182f53ad029bca7e9c2796878526f7706759de7ed99b9fc16b25344ade3c9465c9db0b1fa8960c5ad3320b73a647c4aa213490022008dccc7c3
-
SSDEEP
768:x9QBBBaQauISi/zFuMZ8vek9ZDZ8IZ4WD:wBuOu/zUMZ8Gk99Z8IZnD
Malware Config
Signatures
Files
-
8d74f1e5df4ccebb87107961b96f6ff952909c48f5d049d051bdeaf957b47597.exe windows x86
e56f139dddea1040a3d5b24e68b17d13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
WritePrivateProfileStringA
GetFileAttributesA
LoadLibraryA
lstrcatA
GetPrivateProfileStringA
GetWindowsDirectoryA
CloseHandle
WriteFile
CreateFileA
FreeLibrary
GetProcAddress
lstrlenA
DeleteFileA
GetCurrentProcess
DuplicateHandle
GetShortPathNameA
GetCommandLineA
SetFilePointer
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateThread
CreateDirectoryA
MoveFileExA
GetSystemDirectoryA
ExitProcess
GetTickCount
user32
MessageBoxA
wsprintfA
advapi32
OpenProcessToken
LookupPrivilegeValueA
shell32
SHGetSpecialFolderPathA
msvcrt
sprintf
??2@YAPAXI@Z
srand
rand
_strlwr
strstr
netapi32
Netbios
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
ws2_32
htons
inet_addr
connect
socket
WSAStartup
WSACleanup
gethostbyname
gethostname
closesocket
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE