Static task
static1
Behavioral task
behavioral1
Sample
8a0e8dc1291017ca4fbdc6b2157060b87cc013a0f2c4d4e79bc93ab501531216.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a0e8dc1291017ca4fbdc6b2157060b87cc013a0f2c4d4e79bc93ab501531216.exe
Resource
win10v2004-20221111-en
General
-
Target
8a0e8dc1291017ca4fbdc6b2157060b87cc013a0f2c4d4e79bc93ab501531216
-
Size
57KB
-
MD5
f67c3b2dd55f4e031bfdc7709c20f2fe
-
SHA1
9bb4673487e8418b968b93d520bb6889e603e2f2
-
SHA256
8a0e8dc1291017ca4fbdc6b2157060b87cc013a0f2c4d4e79bc93ab501531216
-
SHA512
310b124e754cf4150d2af9735244fa352a41951239b5002937e9d8ed45a12573c8657518f95f8c8dc82f2d6d13ccf6be5e11883910819305d89614f98d509816
-
SSDEEP
384:b5Z+MpPpslvPqyu73+UZeiYgxd2LqBUfdt9iulTLSDvAuPeo6H:bz+MB6Nu7FZeiFsLqBUfdrlnSDvHx6H
Malware Config
Signatures
Files
-
8a0e8dc1291017ca4fbdc6b2157060b87cc013a0f2c4d4e79bc93ab501531216.exe windows x86
5c39a575f34c1c15e1517bc0a56f75b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
FindFirstFileA
GetLogicalDriveStringsA
ReadFileScatter
DuplicateHandle
PrepareTape
SetEndOfFile
GetOEMCP
VirtualAllocEx
GetDiskFreeSpaceExA
GetShortPathNameW
ReleaseSemaphore
SetErrorMode
VirtualFree
VirtualUnlock
CreateNamedPipeW
GetProcessHeap
SetCommTimeouts
SetConsoleWindowInfo
SetConsoleOutputCP
FindFirstFileExW
LoadLibraryExA
LeaveCriticalSection
UnmapViewOfFile
GetDriveTypeW
GetACP
VirtualProtect
CreateEventA
GetCurrentProcess
SetCommMask
SetThreadPriorityBoost
_lclose
CopyFileExW
GlobalAddAtomW
SetConsoleMode
CreatePipe
IsBadStringPtrA
PulseEvent
GetTimeZoneInformation
FormatMessageW
GetTapeParameters
FreeEnvironmentStringsA
EnumSystemCodePagesA
lstrcpynA
ReadConsoleOutputA
LoadResource
RemoveDirectoryW
GlobalGetAtomNameW
GetPrivateProfileStringW
PurgeComm
SetEnvironmentVariableA
GetDiskFreeSpaceW
SetConsoleActiveScreenBuffer
UnhandledExceptionFilter
DosDateTimeToFileTime
DeleteCriticalSection
FormatMessageA
CreateIoCompletionPort
GetCurrentDirectoryW
PeekConsoleInputW
WriteConsoleOutputCharacterA
GetFileType
GetFileAttributesA
GetSystemDirectoryW
GetBinaryTypeA
GetShortPathNameA
lstrcmpiA
GetCommState
OpenFile
FindFirstFileW
GlobalAddAtomA
GlobalFindAtomW
SetNamedPipeHandleState
DeleteFiber
SetFileTime
GetAtomNameA
RaiseException
GenerateConsoleCtrlEvent
WaitNamedPipeA
GetCommConfig
GetOverlappedResult
GetCommandLineA
VirtualAlloc
GetNumberFormatW
ExitProcess
user32
ToUnicodeEx
DrawTextA
FlashWindowEx
WinHelpA
CreatePopupMenu
DefDlgProcW
UnregisterDeviceNotification
CallNextHookEx
GetKeyState
DialogBoxParamW
DrawEdge
GetWindowPlacement
GetScrollInfo
SetWindowContextHelpId
GetQueueStatus
ScrollDC
GetTitleBarInfo
GetClipboardData
keybd_event
ClipCursor
SetWindowPos
SetDlgItemTextW
GetClassInfoW
GetMessageA
DestroyCursor
OemToCharA
CharUpperBuffA
SwitchToThisWindow
CreateIconFromResource
LoadKeyboardLayoutW
GetClientRect
OpenWindowStationA
IsCharUpperW
LoadBitmapW
SendDlgItemMessageW
SetUserObjectInformationW
DrawTextW
RegisterDeviceNotificationA
GetDoubleClickTime
TabbedTextOutA
GetInputState
SetWindowsHookExA
IsWindow
GetWindowTextLengthA
ScreenToClient
SetKeyboardState
HiliteMenuItem
LoadImageA
GetDlgItem
GetMessageTime
IsWindowUnicode
SystemParametersInfoA
GetMenu
GetClassNameA
RemoveMenu
EnableWindow
TabbedTextOutW
CreateWindowExA
GetClipboardSequenceNumber
EnumDisplayDevicesA
WaitForInputIdle
MessageBoxExA
TranslateMDISysAccel
GetSubMenu
GetMenuItemInfoW
gdi32
CreateRoundRectRgn
EnumEnhMetaFile
StartPage
GetFontLanguageInfo
PlayMetaFileRecord
PtVisible
TextOutW
StartDocW
GetTextMetricsW
SetBitmapBits
Rectangle
SetMetaFileBitsEx
ExtFloodFill
DeleteMetaFile
AddFontResourceA
SetColorAdjustment
ArcTo
ExtTextOutW
LPtoDP
StretchDIBits
comdlg32
ReplaceTextA
CommDlgExtendedError
FindTextW
ReplaceTextW
advapi32
RegisterServiceCtrlHandlerW
RegSetValueExW
LookupAccountNameA
DeleteAce
GetSidIdentifierAuthority
OpenServiceW
LookupPrivilegeValueW
GetSecurityDescriptorControl
InitiateSystemShutdownA
SetSecurityDescriptorDacl
SetThreadToken
LookupAccountSidW
StartServiceA
RevertToSelf
DeregisterEventSource
RegQueryInfoKeyA
StartServiceW
QueryServiceConfigA
BuildTrusteeWithSidW
IsValidSid
shell32
SHChangeNotify
SHFileOperationA
ole32
CoResumeClassObjects
CoMarshalInterface
WriteClassStg
ReadFmtUserTypeStg
CoGetTreatAsClass
CoCreateInstanceEx
OleCreate
CoSwitchCallContext
oleaut32
VariantChangeType
LoadTypeLi
SafeArrayRedim
SetErrorInfo
comctl32
ImageList_Replace
ImageList_SetBkColor
ImageList_ReplaceIcon
shlwapi
SHStrDupW
AssocCreate
StrCmpLogicalW
PathSkipRootW
PathFileExistsA
wvnsprintfW
PathRemoveBlanksW
StrCpyW
StrFormatByteSizeW
PathAddExtensionW
PathIsDirectoryW
PathUnquoteSpacesA
StrTrimW
StrChrIW
UrlGetPartW
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE