Static task
static1
Behavioral task
behavioral1
Sample
8a8f95e630bae2f44425a76bf8e48ee339b2ee661ae26175f3060b35d8a4cea2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a8f95e630bae2f44425a76bf8e48ee339b2ee661ae26175f3060b35d8a4cea2.exe
Resource
win10v2004-20220901-en
General
-
Target
8a8f95e630bae2f44425a76bf8e48ee339b2ee661ae26175f3060b35d8a4cea2
-
Size
165KB
-
MD5
01d4a13739d07dc1af343c6d96033650
-
SHA1
b7c0d036b5b19b9cfaa5a9dda197deb97097a60e
-
SHA256
8a8f95e630bae2f44425a76bf8e48ee339b2ee661ae26175f3060b35d8a4cea2
-
SHA512
366291ac13f162451e65cb820d78b99542797ec7466d79af760a4f4bde8d35699e6faeefbd22dd14f13984c6e0179af20377510e1c8fc121358b054a8aecc740
-
SSDEEP
3072:fGbOM+BEqaDpPXlh89eM206LqpmWxtwkqDBU28W1fLqPh9qkws+S02:fGbOMwIpPI9H206qDxtwkq8IzqppwXI
Malware Config
Signatures
Files
-
8a8f95e630bae2f44425a76bf8e48ee339b2ee661ae26175f3060b35d8a4cea2.exe windows x86
7b3c47b6458103a696f2c952e3307945
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
VirtualFree
VirtualAlloc
lstrcpyA
SetEvent
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
FreeLibrary
lstrcmpA
GetVersionExA
CreateDirectoryA
LocalFree
LocalAlloc
RemoveDirectoryA
WriteFile
Sleep
ReadFile
SetFilePointer
GetLastError
SetLastError
CreateProcessA
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
OpenProcess
MultiByteToWideChar
ExitProcess
GetLocalTime
CreateEventA
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
OutputDebugStringA
ReleaseMutex
SetErrorMode
GetModuleHandleA
InterlockedExchange
RaiseException
GetStartupInfoA
msvcrt
strlen
strstr
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
atoi
strncmp
_errno
wcscpy
strncpy
strtok
_ftol
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_CxxThrowException
memmove
memcpy
strncat
??3@YAXPAX@Z
_strnicmp
__CxxFrameHandler
??2@YAPAXI@Z
memset
ceil
_strupr
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
Sections
.ujyhkuy Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 134KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ