Static task
static1
Behavioral task
behavioral1
Sample
8d331a9c405f6d31bffc5dad49853f29ba7405cbe830cd6e75e6c6dd627d11b0.exe
Resource
win7-20220812-en
General
-
Target
8d331a9c405f6d31bffc5dad49853f29ba7405cbe830cd6e75e6c6dd627d11b0
-
Size
182KB
-
MD5
93a180bc4149c53ccb771e6e0e5d9141
-
SHA1
f68c9f2dc09801b9162dd71f78a3fd38dfad83bd
-
SHA256
8d331a9c405f6d31bffc5dad49853f29ba7405cbe830cd6e75e6c6dd627d11b0
-
SHA512
533f67ea94e28374cd730290d93157d0a10408fd76db5db7c0b8195608f2649e69a5873f2c63282538760221c8cddc6600c74788afe83a97c168161041478c52
-
SSDEEP
3072:fkMefO58BeX9hMqorBUollG3oFcKAvowiMLJe0bsU:sMefPernAG45AplVd
Malware Config
Signatures
Files
-
8d331a9c405f6d31bffc5dad49853f29ba7405cbe830cd6e75e6c6dd627d11b0.exe windows x86
fa8fa20a9716eef69c29e26da1e1d50d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathW
rpcrt4
UuidCreate
user32
DestroyWindow
GetDlgItem
EnumChildWindows
IsWindow
CreateWindowExW
SendMessageA
GetWindowThreadProcessId
ole32
CoGetMalloc
CoSetProxyBlanket
CoCreateInstance
CoTaskMemFree
CoInitializeSecurity
CoUninitialize
CoInitializeEx
CoQueryProxyBlanket
StringFromGUID2
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
GetCalendarInfoW
EnterCriticalSection
GetOEMCP
SetEndOfFile
GetStartupInfoA
HeapReAlloc
VirtualAlloc
ReadFile
GetACP
DeleteCriticalSection
GetCPInfo
IsValidCodePage
InitializeCriticalSection
EnumResourceNamesA
FreeEnvironmentStringsA
RaiseException
HeapDestroy
RtlUnwind
ExitProcess
VirtualFree
LeaveCriticalSection
HeapSize
SetFilePointer
HeapCreate
SetEnvironmentVariableA
newdev
UpdateDriverForPlugAndPlayDevicesW
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ