Static task
static1
Behavioral task
behavioral1
Sample
8da8d1f15974c572a4bcda36940404251925d4b442a119695dc69d703c31ea63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8da8d1f15974c572a4bcda36940404251925d4b442a119695dc69d703c31ea63.exe
Resource
win10v2004-20220812-en
General
-
Target
8da8d1f15974c572a4bcda36940404251925d4b442a119695dc69d703c31ea63
-
Size
126KB
-
MD5
35d9659526d78513822725c905fdf3c6
-
SHA1
22164e358310750905b71b3406811ba545714d08
-
SHA256
8da8d1f15974c572a4bcda36940404251925d4b442a119695dc69d703c31ea63
-
SHA512
528bc3b64f10a75baeeba203073125430022e88c2e1a693fc219b865a6386b2df600483135d564d93a43a6084ef14028612d3acee420718f67d3683fa9d9b782
-
SSDEEP
3072:vRzDZlMlAsgrgSLlrrXFx18y+QTFse/BKa4NC9osZ0B:llsgrNB/T15+x5a9M
Malware Config
Signatures
Files
-
8da8d1f15974c572a4bcda36940404251925d4b442a119695dc69d703c31ea63.exe windows x86
9f7b622ca5daf1baf8f38112451e1b72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
OpenSemaphoreA
LocalHandle
OutputDebugStringA
GetProcAddress
WideCharToMultiByte
GetThreadPriority
DeleteAtom
GetUserDefaultLCID
DefineDosDeviceA
GetProcessHeap
HeapAlloc
GetMailslotInfo
GlobalWire
AllocConsole
GetShortPathNameA
GetProcessTimes
CreateConsoleScreenBuffer
ClearCommError
DuplicateHandle
PurgeComm
SetErrorMode
FindNextChangeNotification
GetTickCount
FreeLibrary
GetExitCodeThread
WaitNamedPipeA
GetLastError
HeapFree
MoveFileExA
ResumeThread
ReleaseSemaphore
GetBinaryTypeA
SizeofResource
GetLogicalDriveStringsA
GetSystemDefaultUILanguage
GetUserDefaultLangID
SetFileTime
GlobalHandle
CreateDirectoryExA
VirtualFree
WriteProfileStringA
GetProcessWorkingSetSize
GetVersion
LockFile
WaitForSingleObject
SetLastError
CopyFileExA
SetEvent
OpenFileMappingA
GetCurrentThread
LoadLibraryExA
GetStdHandle
VirtualFreeEx
IsBadHugeReadPtr
BeginUpdateResourceA
DeleteFileA
GlobalFindAtomA
GetConsoleCP
WritePrivateProfileStringA
GetThreadSelectorEntry
GetCommTimeouts
LocalUnlock
LoadResource
EraseTape
GetFileAttributesA
FreeResource
GlobalUnWire
UpdateResourceA
SetFilePointer
PostQueuedCompletionStatus
IsBadCodePtr
CreateFiber
GetHandleInformation
GlobalFlags
GetPrivateProfileSectionNamesA
ReadProcessMemory
GetThreadLocale
HeapReAlloc
WaitForMultipleObjects
GetProfileSectionA
GetLongPathNameA
SetFileAttributesA
GetConsoleCursorInfo
VirtualAllocEx
GetEnvironmentStrings
CreateRemoteThread
DeleteFiber
FoldStringA
GlobalUnfix
GlobalUnlock
WaitForSingleObjectEx
GetOEMCP
GetACP
VirtualQuery
GetTempPathA
GetProcessHeaps
QueryPerformanceCounter
GlobalFree
LocalLock
GetModuleHandleA
GetProcessVersion
GetFileType
HeapDestroy
LocalAlloc
PulseEvent
SignalObjectAndWait
PeekConsoleInputA
CancelWaitableTimer
RemoveDirectoryA
GlobalLock
GetCurrentProcessId
GetCurrentProcess
LocalSize
AreFileApisANSI
SleepEx
GetPrivateProfileStringA
CallNamedPipeA
MoveFileA
IsBadHugeWritePtr
WritePrivateProfileStructA
HeapValidate
GetLocalTime
FormatMessageA
IsDebuggerPresent
IsProcessorFeaturePresent
GetProfileIntA
GetFileInformationByHandle
CreateDirectoryA
ConnectNamedPipe
OpenMutexA
OpenProcess
GetDriveTypeA
WriteFile
GetProfileStringA
FindFirstChangeNotificationA
QueryDosDeviceA
GetThreadPriorityBoost
QueueUserAPC
GetCommandLineA
GetStartupInfoA
msvcrt
time
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE