Static task
static1
Behavioral task
behavioral1
Sample
8d9b7b416e66547906fae5ff94ae00f5b5c9dd16f841d6572d7bdbdba72b1647.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d9b7b416e66547906fae5ff94ae00f5b5c9dd16f841d6572d7bdbdba72b1647.exe
Resource
win10v2004-20221111-en
General
-
Target
8d9b7b416e66547906fae5ff94ae00f5b5c9dd16f841d6572d7bdbdba72b1647
-
Size
88KB
-
MD5
acba69a485f5a553a444ef4d0f12bfaf
-
SHA1
ec58398996edc53d81d72569092bcbab438f7d8a
-
SHA256
8d9b7b416e66547906fae5ff94ae00f5b5c9dd16f841d6572d7bdbdba72b1647
-
SHA512
97f8445d1189745423a86c135ae157d16672a51f67ef54fd6c27b59e77cf7a03e7b7569930d0aa0c7dd7cfd1254643749c432c6d89304cb8a1cf2f90cf54d241
-
SSDEEP
1536:jwN0qL2bKVm8Obmp6OOlTz9RDbhANvOYUKOOV0ViFt1:2UKVmOa9RfYp
Malware Config
Signatures
Files
-
8d9b7b416e66547906fae5ff94ae00f5b5c9dd16f841d6572d7bdbdba72b1647.exe windows x86
f45617f73e02716597ac15c54c029b73
Headers
Imports
kernel32
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetDateFormatA
GetFileSize
GetLocalTime
GetModuleFileNameA
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
LoadLibraryA
CreateMutexA
MapViewOfFile
OpenProcess
Process32First
Process32Next
ReadFile
ReleaseMutex
SetEndOfFile
SetFileAttributesA
SetFilePointer
Sleep
SystemTimeToFileTime
TerminateProcess
UnmapViewOfFile
WaitForSingleObject
WinExec
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateFileMappingA
CreateFileA
CopyFileA
CompareFileTime
LocalFree
CloseHandle
user32
CharLowerA
CharUpperA
wsprintfA
wsock32
gethostbyname
gethostname
inet_addr
accept
WSAStartup
listen
recv
select
send
socket
connect
closesocket
bind
ole32
CreateStreamOnHGlobal
CoInitialize
shlwapi
StrStrIA
StrChrIA
PathFileExistsA
StrTrimA
StrDupA
StrRChrA
wininet
InternetGetConnectedState
FindFirstUrlCacheEntryA
FindCloseUrlCache
DeleteUrlCacheEntryA
FindNextUrlCacheEntryA
advapi32
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyA
urlmon
URLDownloadToFileA
shell32
ShellExecuteA
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE