Static task
static1
Behavioral task
behavioral1
Sample
8c6fa106183996e53c865669326a6b4f807fd1e6441c7a8c87af1211913ed46e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c6fa106183996e53c865669326a6b4f807fd1e6441c7a8c87af1211913ed46e.exe
Resource
win10v2004-20220812-en
General
-
Target
8c6fa106183996e53c865669326a6b4f807fd1e6441c7a8c87af1211913ed46e
-
Size
174KB
-
MD5
38f7427046c2288b35bbf2cdf1dd46fb
-
SHA1
d62efc85e665824d29699356b65e61b6d692d4ab
-
SHA256
8c6fa106183996e53c865669326a6b4f807fd1e6441c7a8c87af1211913ed46e
-
SHA512
29478a63da64961de6e027d6a73f6ec0971dcd1e1772398cd5a53a140c65794e0264f27c72218a5e1a45e007376014f8c2da0aeb95a3723686f8b4c556af8c21
-
SSDEEP
1536:EZRHORQoWOkN0BO5P2hXzYmFww9DfynFyJZ++:EZRH6qP29zYmFryn
Malware Config
Signatures
Files
-
8c6fa106183996e53c865669326a6b4f807fd1e6441c7a8c87af1211913ed46e.exe windows x86
52e4bba0eb6a02138f2a8c169fcbe2a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetModuleFileNameA
LeaveCriticalSection
LocalAlloc
GetCommandLineA
WriteFile
GetSystemTimeAsFileTime
TerminateProcess
FormatMessageW
GetCurrentProcessId
DeleteCriticalSection
HeapFree
HeapFree
GetModuleHandleW
VirtualFree
VirtualAlloc
HeapFree
ReadFile
CloseHandle
GetModuleHandleA
SetFilePointer
DeleteCriticalSection
GetStartupInfoW
HeapDestroy
FormatMessageW
TerminateProcess
GetLastError
GetVersionExA
WaitForSingleObject
Sleep
user32
GetMessageW
SendMessageA
SendMessageW
GetFocus
MessageBoxA
GetDlgCtrlID
EndDialog
ShowWindow
SetWindowLongW
GetWindowLongW
GetWindowLongW
GetWindowLongW
CreateWindowExW
MessageBeep
OffsetRect
advapi32
InitializeSecurityDescriptor
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegSetValueExW
GetLengthSid
GetTokenInformation
AllocateAndInitializeSid
RegQueryInfoKeyW
RegSetValueExW
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE