Static task
static1
Behavioral task
behavioral1
Sample
8132ef4497751bc8c34f9e8beeb0eab9a289084597eee94192aa72bab20d0437.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8132ef4497751bc8c34f9e8beeb0eab9a289084597eee94192aa72bab20d0437.exe
Resource
win10v2004-20220901-en
General
-
Target
8132ef4497751bc8c34f9e8beeb0eab9a289084597eee94192aa72bab20d0437
-
Size
105KB
-
MD5
8922d956e664b135659b7d492bca0ae0
-
SHA1
5e28dc2aa82a9294221b6bb32ba909df8a9bfc55
-
SHA256
8132ef4497751bc8c34f9e8beeb0eab9a289084597eee94192aa72bab20d0437
-
SHA512
0273c70e34c1595619b63b82328fa099a4e16f15a674d453f569cb761fc4918bde01fcc74214ca137712555fa8f6a872e11bcde8d8fc8909517c9fede461683b
-
SSDEEP
3072:xs43mTiCjeM548HyRvPxvqxRU12EYvXIw8:UHthSBKRU1WvXIw8
Malware Config
Signatures
Files
-
8132ef4497751bc8c34f9e8beeb0eab9a289084597eee94192aa72bab20d0437.exe windows x86
16e6a5a86897fed9c5d6d0a26292738d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetWindowsDirectoryA
GetCurrentProcess
GetProcAddress
LoadLibraryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
TerminateProcess
GetTickCount
MoveFileExA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
DeleteFileA
GetSystemWindowsDirectoryA
MoveFileA
GetModuleHandleA
user32
wsprintfA
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
msvcrt
_exit
_controlfp
_except_handler3
??3@YAXPAX@Z
??2@YAPAXI@Z
fclose
fwrite
fseek
fopen
_mbsrchr
_mbsicmp
_mbsnbcpy
_mbslwr
__CxxFrameHandler
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
WSCInstallNameSpace
WSAStartup
WSAGetLastError
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ