Static task
static1
Behavioral task
behavioral1
Sample
8d7b85df24b3dbe232b1a85498be975a5cfe31713070034e54c18c5d51d439c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d7b85df24b3dbe232b1a85498be975a5cfe31713070034e54c18c5d51d439c2.exe
Resource
win10v2004-20220812-en
General
-
Target
8d7b85df24b3dbe232b1a85498be975a5cfe31713070034e54c18c5d51d439c2
-
Size
315KB
-
MD5
4922d4e00c86eb4acad58faec9a4f53b
-
SHA1
9bd2a6982d0f3d23ca3497daf0fc9cb5eeadce20
-
SHA256
8d7b85df24b3dbe232b1a85498be975a5cfe31713070034e54c18c5d51d439c2
-
SHA512
edfc76f1309b7a3d08c52400acc43289c8c11d623ba941e6a8e56ee3f3668b2fe2996a804fba6ab37e3002a1eabb879e3bec3fafb264241caa38e206868ad2c5
-
SSDEEP
6144:J02PZsMtRegkTY7CpgINQ+xFgX/V/gi2oin6YjbfTBPvULsapAidyi5KR8ald:iLOzkUGpgINQ+x+giHYHfap1B5a8
Malware Config
Signatures
Files
-
8d7b85df24b3dbe232b1a85498be975a5cfe31713070034e54c18c5d51d439c2.exe windows x86
8d177f852792bba9ab2a41f63c7ac015
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetEvent
DeleteFileW
FreeLibrary
ReadFile
CreateEventW
LeaveCriticalSection
GetDateFormatW
SetCurrentDirectoryW
EnterCriticalSection
VirtualAlloc
GetSystemTimeAsFileTime
FindVolumeMountPointClose
SetTapeParameters
CloseHandle
CreateFileW
GetModuleFileNameW
GetDriveTypeW
LocalFree
SystemTimeToFileTime
CreateMutexW
GetCurrentDirectoryW
GetWindowsDirectoryW
GlobalAlloc
GetTapePosition
ReleaseMutex
GetVolumeInformationW
CreateHardLinkW
GetDiskFreeSpaceExW
WaitForSingleObject
LocalFileTimeToFileTime
FlushFileBuffers
GetTickCount
GetUserDefaultLCID
GetTimeFormatW
FindClose
GlobalFree
GetProcAddress
LoadLibraryW
ExpandEnvironmentStringsW
CompareStringW
SetUnhandledExceptionFilter
DeviceIoControl
GetFileInformationByHandle
GetLogicalDriveStringsW
GetCurrentDirectoryA
WideCharToMultiByte
GetCurrentProcess
GetTimeZoneInformation
WriteTapemark
GetSystemDirectoryW
VerSetConditionMask
SetPriorityClass
WritePrivateProfileStringW
GetFileSize
SetEndOfFile
LocalFree
GetFileAttributesW
FindNextVolumeMountPointW
FindFirstFileW
InitializeCriticalSection
GetCurrentThreadId
HeapAlloc
GetEnvironmentVariableW
HeapFree
GetLastError
GetCurrentProcessId
ReleaseSemaphore
DeleteCriticalSection
GetNumberFormatW
GetVersionExA
GetVolumeNameForVolumeMountPointW
GetPriorityClass
CreateSemaphoreW
VirtualFree
GetExitCodeThread
BackupSeek
GetSystemTime
LoadLibraryA
msorcl32
SQLFetch
SQLTransact
SQLFreeConnect
SQLGetInfo
SQLSpecialColumns
SQLRowCount
SQLGetConnectOption
SQLGetCursorName
SQLConnect
SQLBrowseConnect
SQLAllocEnv
SQLDriverConnect
DllUnregisterServer
SQLExecDirect
SQLProcedureColumns
SQLFreeEnv
SQLSetStmtOption
ConfigDSN
SQLSetPos
SQLPutData
mscms
GetColorDirectoryA
SetStandardColorSpaceProfileW
RegisterCMMA
DeleteColorTransform
CloseColorProfile
InternalGetDeviceConfig
SetColorProfileElementSize
CreateMultiProfileTransform
GetColorProfileElementTag
UnregisterCMMW
InternalGetPS2PreviewCRD
AssociateColorProfileWithDeviceA
CreateDeviceLinkProfile
InternalGetPS2ColorRenderingDictionary
IsColorProfileValid
RegisterCMMW
OpenColorProfileA
GetPS2ColorRenderingIntent
GenerateCopyFilePaths
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ