Static task
static1
Behavioral task
behavioral1
Sample
08ea0eec0e280bea8e6c6047f262a179d567a0671715c1d11ac8938ec3925ad9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
08ea0eec0e280bea8e6c6047f262a179d567a0671715c1d11ac8938ec3925ad9.exe
Resource
win10v2004-20221111-en
General
-
Target
08ea0eec0e280bea8e6c6047f262a179d567a0671715c1d11ac8938ec3925ad9
-
Size
2.4MB
-
MD5
03db9c0a03fd56958b0b0cbec232f637
-
SHA1
7607d6857517ec5b6b846842d5c6128ff6cf5b7d
-
SHA256
08ea0eec0e280bea8e6c6047f262a179d567a0671715c1d11ac8938ec3925ad9
-
SHA512
9fc834def2ffab6984633a9ef7c6e244ea7f193c30a51b5f7a03cad581cbd52fab886b21a2258d7c9677b455486b9d7ca56c2fc5d9d07cfceb6c773455714457
-
SSDEEP
49152:uoo4GK66Y6VnlTSfoCHDiimFhZi0xj6ffitTW3E23:HvnwSiqdxj8fv023
Malware Config
Signatures
Files
-
08ea0eec0e280bea8e6c6047f262a179d567a0671715c1d11ac8938ec3925ad9.exe windows x86
f73fcbce748129f5ebe3acfeaad6b89d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
gdi32
GetStockObject
kernel32
GetDriveTypeA
GetFullPathNameA
CreateDirectoryA
GlobalMemoryStatus
OutputDebugStringA
LoadLibraryA
FreeLibrary
QueryPerformanceCounter
CloseHandle
GetVersionExA
Module32Next
CreateToolhelp32Snapshot
GetSystemInfo
Module32First
SetUnhandledExceptionFilter
GetSystemDirectoryA
GetWindowsDirectoryA
IsProcessorFeaturePresent
CreateFileA
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
GetCurrentThread
InitializeCriticalSection
Sleep
LeaveCriticalSection
SetThreadPriority
FindFirstFileA
RemoveDirectoryA
CopyFileA
EnterCriticalSection
FindClose
GetModuleFileNameA
FindNextFileA
DeleteCriticalSection
GetSystemTime
DeleteFileA
GetCommandLineA
SetCurrentDirectoryA
GetModuleHandleA
SetEvent
CreateEventA
ResumeThread
QueryPerformanceFrequency
InterlockedExchange
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetProcessHeap
GetStartupInfoA
ExitThread
CreateThread
RtlUnwind
ExitProcess
GetCurrentThreadId
RaiseException
LCMapStringA
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
LockResource
GetFileType
HeapSize
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FlushFileBuffers
SetStdHandle
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
CompareStringA
SetEnvironmentVariableA
SetEndOfFile
GetCurrentDirectoryA
rpcrt4
UuidFromStringA
shell32
ShellExecuteA
shlwapi
PathIsRelativeA
user32
ReleaseCapture
ShowWindow
GetCursorPos
GetKeyboardState
TranslateMessage
BeginPaint
GetClientRect
EnumDisplaySettingsA
LoadIconA
SetForegroundWindow
SetCapture
SetCursor
DestroyWindow
ClientToScreen
EndPaint
RegisterClassA
DefWindowProcA
CreateWindowExA
SetWindowPos
AdjustWindowRect
GetDC
FillRect
GetSystemMetrics
LoadCursorFromFileA
MessageBoxA
ShowCursor
LoadCursorA
ReleaseDC
winmm
timeEndPeriod
timeGetTime
waveOutClose
waveOutWrite
waveOutPrepareHeader
waveOutOpen
waveOutUnprepareHeader
waveOutReset
timeBeginPeriod
d3d8
Direct3DCreate8
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ