Static task
static1
Behavioral task
behavioral1
Sample
8279299efe88c258412365f3b10bc50e5b4c06e468faa23f3e8a684a2b7b0af6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8279299efe88c258412365f3b10bc50e5b4c06e468faa23f3e8a684a2b7b0af6.exe
Resource
win10v2004-20221111-en
General
-
Target
8279299efe88c258412365f3b10bc50e5b4c06e468faa23f3e8a684a2b7b0af6
-
Size
164KB
-
MD5
e10988f3d4de2cffcac344aeaa4c8e9a
-
SHA1
0d69bdfcf28f3ef1becd17d454f9b428345fffd5
-
SHA256
8279299efe88c258412365f3b10bc50e5b4c06e468faa23f3e8a684a2b7b0af6
-
SHA512
6cb95b2327b4cc51126d762ddd8a9c0d016b445ebd3eab1ffb7d43bffdde13e4f49f670cddf5c00e21a1760975619d19fd5e6018dc65203ca83478e9676e9bc2
-
SSDEEP
3072:xoJOEmeLOr9qu7HmRPObVdOIi3QxOfuiT63tijDW9It51+cz:g4HrsmGRPObVdOutJ9Id
Malware Config
Signatures
Files
-
8279299efe88c258412365f3b10bc50e5b4c06e468faa23f3e8a684a2b7b0af6.exe windows x86
3cb9b8f5e08e08bae4fba6dcb2d477fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
RemoveDirectoryA
GetCommandLineA
GetDriveTypeA
GetVersion
lstrlenA
GetACP
GetUserDefaultLangID
IsDebuggerPresent
lstrcmpA
GetThreadLocale
MulDiv
GetProcessHeap
lstrcmpiA
DeleteFileW
QueryPerformanceCounter
lstrcmpiW
GlobalFindAtomA
GetConsoleOutputCP
GlobalFindAtomW
SetCurrentDirectoryA
GetCurrentThreadId
GetStartupInfoA
GetTickCount
GetModuleHandleW
CopyFileA
GetCommandLineW
GetOEMCP
GetCurrentProcessId
GetWindowsDirectoryA
GetCurrentThread
GetModuleHandleA
DeleteFileA
VirtualAlloc
VirtualFree
gdi32
CreateSolidBrush
CreateCompatibleDC
CreatePalette
PatBlt
GetStockObject
GetDeviceCaps
SetMapMode
CreateFontIndirectA
SelectObject
DeleteDC
SetTextColor
DeleteObject
SelectPalette
GetTextMetricsA
RestoreDC
CreatePen
SetTextAlign
SaveDC
LineTo
SetStretchBltMode
GetClipBox
RectVisible
GetPixel
GetObjectA
user32
GetDesktopWindow
GetSystemMetrics
GetDC
GetParent
CharNextA
TranslateMessage
glu32
gluNurbsCallback
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Vxun, Oo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Bemnch P Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ