Static task
static1
Behavioral task
behavioral1
Sample
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
Resource
win10v2004-20220812-en
General
-
Target
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0
-
Size
168KB
-
MD5
614dfc5635f3515b6b8c63b2928f98e0
-
SHA1
fabc50160503331844442f655fd3b73d18cc098d
-
SHA256
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0
-
SHA512
2ed82946b950899c59d3e07f089069c57e1f37e5673aa80f949e3d570231c51926908b59c15acf6e49f07d9b0d1f4d29c8887623a6b6939459e2dc80b8907ae0
-
SSDEEP
1536:HW26WFbKrDU9DTWYvOfw/5+9LbIcvxLg3c3XlSPolNgZfAXgVH/QtM0BWr0pkd:PTW6LcLbIVclSrfAwfQtMJr0pkd
Malware Config
Signatures
Files
-
8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe windows x86
bc1b3bec8a24b8afb2ffd8e2375d5bda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
kernel32
CreateFileW
GetFileSize
ReadFile
CloseHandle
OpenSemaphoreW
WaitForSingleObject
CreateProcessA
ReleaseSemaphore
GetModuleFileNameW
Sleep
OpenProcess
GetVersionExA
CreateSemaphoreW
GetACP
WriteConsoleW
GetTickCount
CreateProcessW
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetCPInfo
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
CreateFileA
InitializeCriticalSection
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
user32
GetKeyboardState
CharLowerW
GetActiveWindow
advapi32
RegSetValueExW
RegCreateKeyExW
GetUserNameW
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ