Static task
static1
Behavioral task
behavioral1
Sample
8b678daf7e0ca5c08d47be7ee93c1aeeae8197064dc40db9a550ca80aec7fdb7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b678daf7e0ca5c08d47be7ee93c1aeeae8197064dc40db9a550ca80aec7fdb7.exe
Resource
win10v2004-20221111-en
General
-
Target
8b678daf7e0ca5c08d47be7ee93c1aeeae8197064dc40db9a550ca80aec7fdb7
-
Size
40KB
-
MD5
4b17d34ce5ee0187d3c07cad2d43c255
-
SHA1
7a1a3a26aa185001f54a9f6ede0fdd1cad998394
-
SHA256
8b678daf7e0ca5c08d47be7ee93c1aeeae8197064dc40db9a550ca80aec7fdb7
-
SHA512
2447856365cc2b90b0a7de876cf248ef366115b19007bbfb33fe0203b1766f63d64d209303453cbce30a972c2635f046cbd7ed27fc27ab3b25db054420bd53ce
-
SSDEEP
768:gVNBCZo9xkRl9ntXSK1rhPYZz79NkAxpSuOX17ACUwe890hu4p:gPBS/tVhPYZz5N3xpSuOKC48e
Malware Config
Signatures
Files
-
8b678daf7e0ca5c08d47be7ee93c1aeeae8197064dc40db9a550ca80aec7fdb7.exe windows x86
f04cfdde3e346d818184b9c27fbd1529
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
StrStrIA
StrChrA
kernel32
GetLastError
CreateMutexA
DeleteFileA
ReadFile
Sleep
WriteFile
CreateFileA
GetTickCount
GetVersionExA
ExitProcess
MoveFileA
TerminateProcess
OpenProcess
ExpandEnvironmentStringsA
lstrlenA
GetFileAttributesExA
SetFilePointer
GetModuleFileNameA
CreateThread
OpenMutexA
lstrcatA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
GetEnvironmentVariableA
FindClose
FindNextFileA
FindFirstFileA
GetFileAttributesA
GetTempPathA
lstrcmpiA
LocalFree
GetComputerNameA
GetSystemInfo
GetVolumeInformationA
lstrcpynA
HeapFree
GetProcessHeap
HeapAlloc
WaitForSingleObject
ReleaseMutex
CreateProcessA
CreateToolhelp32Snapshot
CloseHandle
Process32First
Process32Next
GetStartupInfoA
GetCurrentThread
GetModuleHandleA
advapi32
LookupPrivilegeValueA
OpenThreadToken
AdjustTokenPrivileges
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ImpersonateSelf
shell32
ShellExecuteExA
ShellExecuteA
user32
GetCursorPos
wsprintfA
GetSystemMetrics
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetConnectedState
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
FindCloseUrlCache
FindNextUrlCacheEntryA
InternetReadFile
netapi32
NetScheduleJobEnum
NetScheduleJobDel
NetApiBufferFree
NetScheduleJobAdd
msvcrt
_controlfp
__set_app_type
__p__fmode
_CxxThrowException
__dllonexit
__p__commode
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strncpy
??3@YAXPAX@Z
??2@YAPAXI@Z
atoi
realloc
rand
strcmp
sprintf
free
strlen
getenv
malloc
_except_handler3
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
srand
wcslen
_snprintf
strcat
strcpy
ole32
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ