Static task
static1
Behavioral task
behavioral1
Sample
8cf9f9d11083c904edc5a5711c60b5b1c538447b180cc303a3efd8712d4c6c30.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8cf9f9d11083c904edc5a5711c60b5b1c538447b180cc303a3efd8712d4c6c30.exe
Resource
win10v2004-20220812-en
General
-
Target
8cf9f9d11083c904edc5a5711c60b5b1c538447b180cc303a3efd8712d4c6c30
-
Size
46KB
-
MD5
21de062a9033f985c5e1865638cd493b
-
SHA1
96ee929ca57053fdfabe58bd54d12079eb3f26a1
-
SHA256
8cf9f9d11083c904edc5a5711c60b5b1c538447b180cc303a3efd8712d4c6c30
-
SHA512
432784320c4a85392c06bb54e4ec59cb7385d906e34eebceb2860662850df5b146a0ed92942418f6f62aab1f951990eab394aecc33a5131706448733cf293505
-
SSDEEP
768:4IIn1pEBmdalyU92bCeG3qxFqfFlhhyXZfWfgib5XxNqZ9AaTjcWc:hY1QmdalyYmCeG3yFyHBfb5hNqpTjcWc
Malware Config
Signatures
Files
-
8cf9f9d11083c904edc5a5711c60b5b1c538447b180cc303a3efd8712d4c6c30.exe windows x86
e4d695ba1c0cf3f5654b192da1ec2adc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
ReadClassStg
CoGetObjectContext
ComPs_NdrDllUnregisterProxy
STGMEDIUM_UserSize
PropSysAllocString
HDC_UserFree
OleCreateFromDataEx
HMENU_UserUnmarshal
CoGetCallContext
OleQueryCreateFromData
CoGetStandardMarshal
WdtpInterfacePointer_UserFree
OleRegGetUserType
GetHGlobalFromILockBytes
OleCreateMenuDescriptor
CoInitializeEx
ReadFmtUserTypeStg
StgIsStorageFile
CoReactivateObject
HMETAFILE_UserUnmarshal
WdtpInterfacePointer_UserSize
CoGetInstanceFromFile
CoQueryAuthenticationServices
ComPs_NdrDllRegisterProxy
HENHMETAFILE_UserMarshal
OleCreateFromFile
CoGetInterceptor
CoGetInterceptorFromTypeInfo
ntdll
cos
ZwLoadKey
RtlCustomCPToUnicodeN
RtlDeleteAce
_allrem
NtWaitForDebugEvent
RtlpNtCreateKey
NtQuerySemaphore
ZwCreateEvent
RtlLookupElementGenericTableAvl
CsrIdentifyAlertableThread
NtQueryQuotaInformationFile
ZwOpenThreadTokenEx
atan
RtlCheckRegistryKey
ZwFlushBuffersFile
RtlRunDecodeUnicodeString
RtlComputePrivatizedDllName_U
NtQueryInformationToken
NtWriteFile
RtlSetTimeZoneInformation
NtQueryMultipleValueKey
RtlAddressInSectionTable
RtlSetHeapInformation
NtFlushInstructionCache
NtWaitForSingleObject
kernel32
SetupComm
SetThreadContext
VirtualAlloc
CreateHardLinkW
ConvertThreadToFiber
GetDriveTypeA
GetProcAddress
LoadLibraryA
GetQueuedCompletionStatus
GlobalAlloc
SetConsoleCursor
GetOEMCP
InitializeCriticalSection
CreateIoCompletionPort
CreateMutexA
IsWow64Process
GetModuleHandleW
VDMOperationStarted
ClearCommError
DnsHostnameToComputerNameA
lstrcmpi
lstrcmpW
GetStartupInfoA
DosPathToSessionPathW
SetConsoleNumberOfCommandsA
DosDateTimeToFileTime
EraseTape
GetNumaHighestNodeNumber
TransmitCommChar
GetExpandedNameA
SetConsoleInputExeNameW
SetConsoleWindowInfo
crtdll
_amsg_exit
_mbsspn
iswctype
_dup2
_rmtmp
isdigit
_mbsstr
perror
_ismbbkana
gets
_CIlog10
_wtoi
_finite
_seterrormode
wcscmp
_copysign
free
_ismbcdigit
_wtol
_strdate
_mbsnbcpy
_fileinfo_dll
__mb_cur_max_dll
vwprintf
sinh
_strerror
_wcsset
__fpecode
strlen
_lrotl
_read
_mbschr
_ismbcupper
_getch
_mbsnextc
_hypot
strncpy
time
malloc
_stricoll
_purecall
_sopen
_access
strcoll
_mbsdup
_chgsign
putc
ldiv
_local_unwind2
_CItan
_spawnl
_ismbcsymbol
setvbuf
_getpid
cos
_CIpow
printf
wcscoll
_acmdln_dll
_wcsicoll
sqlunirl
_GetProfileString_@20
_WriteConsoleInput_@16
_SendMessageTimeout_@28
_ShellExecuteEx_@4
_MessageBoxEx_@20
_IsDialogMessage@8
_RegisterEventSource_@8
_RegQueryValue_@16
_CreateProcess_@40
_ChooseFont_@4
_DefineDosDevice_@12
_ChangeMenu_@20
_DefDlgProc_@16
_InsertMenu_@20
_RegisterClassEx_@4
_tfopen
_RegDeleteValue_@8
_CreateDirectoryEx_@12
_ShellAbout_@16
_DefFrameProc_@20
_EnumResourceNames_@16
_RegCreateKeyEx_@36
_CreateFileMapping_@24
_trename
_CreateEnhMetaFile_@16
_CreateDesktop_@24
_ReadEventLog_@28
_GetOutlineTextMetrics_@12
_ObjectCloseAuditAlarm_@12
_GetDriveType_@4
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ