Static task
static1
Behavioral task
behavioral1
Sample
8f8d70342ab3dc44dcc20192665dfa680e14b45dae202613aaf7032bef10c661.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f8d70342ab3dc44dcc20192665dfa680e14b45dae202613aaf7032bef10c661.exe
Resource
win10v2004-20220812-en
General
-
Target
8f8d70342ab3dc44dcc20192665dfa680e14b45dae202613aaf7032bef10c661
-
Size
441KB
-
MD5
407c781317c990b8892664ceee02730a
-
SHA1
183775887e9f51b3895f803633dc7e41bdfc4f55
-
SHA256
8f8d70342ab3dc44dcc20192665dfa680e14b45dae202613aaf7032bef10c661
-
SHA512
2e859482c337e0dea7cb1fd9d7661eb7763a84e725b009ee79a25deff2c71d0c7e5bfb4cc6ae0ef3efbed4e5cf857e6b50f3d673c113a77dcbb0068afa52cd72
-
SSDEEP
3072:wi2Y63OyQe1fbjPssdQJjmYtCsm+H7oL5Wn:wiq3KeZbjXSJjmYtx7osn
Malware Config
Signatures
Files
-
8f8d70342ab3dc44dcc20192665dfa680e14b45dae202613aaf7032bef10c661.exe windows x86
1d274826f6b0e4146701bbe09f1a1860
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
Sleep
GetCurrentProcessId
GetCommandLineA
lstrcmpA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSectionAndSpinCount
IsValidCodePage
RemoveDirectoryA
GetCPInfo
HeapSize
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocalTime
SystemTimeToFileTime
CompareFileTime
VirtualProtect
OutputDebugStringA
lstrcatA
GetModuleFileNameA
CreateFileA
FindResourceA
LoadResource
LockResource
GetFileSize
ReadFile
WideCharToMultiByte
SizeofResource
WriteFile
GetCurrentProcess
CloseHandle
GetACP
lstrcmpiA
ExitProcess
lstrlenA
CreateMutexA
GetLastError
lstrcpyA
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetOEMCP
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetModuleHandleW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetStartupInfoA
HeapFree
HeapAlloc
RtlUnwind
VirtualQuery
TerminateProcess
user32
CopyRect
FrameRect
InflateRect
DrawTextA
DrawIconEx
GetDesktopWindow
GetWindowDC
ReleaseDC
GetSystemMetrics
CreatePopupMenu
InsertMenuItemA
MessageBeep
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
UnregisterHotKey
SetForegroundWindow
GetCursorPos
DefWindowProcA
DestroyWindow
DialogBoxParamA
GetDlgItemTextA
wsprintfA
FindWindowA
EnableWindow
PostMessageA
SendMessageA
UpdateWindow
IsDlgButtonChecked
SendDlgItemMessageA
GetDlgItem
SetClassLongA
GetSysColor
GetDlgCtrlID
EndDialog
RegisterHotKey
LoadCursorA
RegisterClassExA
CreateWindowExA
MessageBoxA
LoadIconA
TrackPopupMenuEx
gdi32
CreateSolidBrush
CreatePen
SetBkMode
MoveToEx
LineTo
DeleteObject
SelectObject
GetTextExtentPoint32A
CreateFontA
CreateBrushIndirect
SetBkColor
SetTextColor
GetStockObject
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityA
RegDeleteKeyA
RegOpenKeyA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegDeleteValueA
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetFolderPathA
Shell_NotifyIconA
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.illwin Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ