Static task
static1
Behavioral task
behavioral1
Sample
8129a7fee39d616475044771f7a99cb8c57a3be57e4e915630cb8fe5a3888ecf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8129a7fee39d616475044771f7a99cb8c57a3be57e4e915630cb8fe5a3888ecf.exe
Resource
win10v2004-20221111-en
General
-
Target
8129a7fee39d616475044771f7a99cb8c57a3be57e4e915630cb8fe5a3888ecf
-
Size
296KB
-
MD5
5338e8673f7985a41ff8e30fad703f3f
-
SHA1
0866e89e058d9f3a4de379b6d86e22afe447a3a4
-
SHA256
8129a7fee39d616475044771f7a99cb8c57a3be57e4e915630cb8fe5a3888ecf
-
SHA512
8a8801b7fd6d280775c25ad1204775cbe4b9afaba15c8ff5c7244544dce3f493c549c8e4c4138528b4cd556d8475ba0922a4557a61f1334e8ed76b466e2f2e68
-
SSDEEP
6144:xy2Blvfu8eoqd5odzw99Q/9PVsB9YXFbZ9ol3cH/3tGk:walvfu5jd58zwXQFP6B9xcf3Yk
Malware Config
Signatures
Files
-
8129a7fee39d616475044771f7a99cb8c57a3be57e4e915630cb8fe5a3888ecf.exe windows x86
d76ab8e23a82d901f27bbf055b3da2b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessagePos
UpdateWindow
GetClassNameA
GetDC
GetAsyncKeyState
EnumChildWindows
SetWindowPos
GetWindowTextA
FindWindowA
SetClipboardData
DestroyWindow
SendMessageA
IsClipboardFormatAvailable
SendDlgItemMessageA
CheckRadioButton
SetForegroundWindow
GetMessageA
CloseClipboard
EndDialog
OffsetRect
LoadIconA
MapDialogRect
BeginDeferWindowPos
DeferWindowPos
CreateMenu
UnregisterHotKey
GetPropA
TranslateMessage
RegisterWindowMessageA
setupapi
SetupGetFileCompressionInfoA
SetupGetInfFileListA
SetupScanFileQueueA
SetupInstallFilesFromInfSectionA
SetupOpenAppendInfFileA
SetupOpenFileQueue
SetupGetSourceFileLocationA
SetupGetSourceFileSizeA
SetupCloseFileQueue
SetupCloseInfFile
SetupCommitFileQueueA
SetupDecompressOrCopyFileA
SetupRemoveFileLogEntryA
SetupOpenLog
SetupCloseLog
SetupInitializeFileLogA
SetupQueryFileLogA
kernel32
LeaveCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetSystemInfo
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
VirtualQuery
InterlockedExchange
RtlUnwind
FatalAppExitA
HeapAlloc
InitializeCriticalSection
HeapFree
VirtualFree
HeapCreate
HeapDestroy
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GetCurrentThreadId
SetLastError
TlsAlloc
IsProcessorFeaturePresent
VirtualProtect
GetWindowsDirectoryA
GetLastError
CloseHandle
GetFileType
CreateFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
SetHandleCount
GetStdHandle
DeleteCriticalSection
SetStdHandle
EnterCriticalSection
SetEndOfFile
ReadFile
SetFilePointer
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE