Static task
static1
Behavioral task
behavioral1
Sample
8b660cd355734d8c9a373eb1dd1736d40d1811b683219a79ae65831a183daadd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b660cd355734d8c9a373eb1dd1736d40d1811b683219a79ae65831a183daadd.exe
Resource
win10v2004-20220812-en
General
-
Target
8b660cd355734d8c9a373eb1dd1736d40d1811b683219a79ae65831a183daadd
-
Size
172KB
-
MD5
d6f1ca26645ff8c82d25a6f84d365fbb
-
SHA1
7ab8a6e9a07a91848439a9390da0a70c3fbf8b75
-
SHA256
8b660cd355734d8c9a373eb1dd1736d40d1811b683219a79ae65831a183daadd
-
SHA512
773099ee808aab9855db5ee32c91d79f1cb9e42d553036f70904306ae6712505265c373e69216602cf0a675439abf470e89367010a45885e843534ef9d960743
-
SSDEEP
1536:dkHISBml7kkPNE8wVEE1lSpfAgmo9hpbTvhewn86H0tb1t8xHAcOdaH/Qt8Ypkd:OHP0G1Ed1fbX8LuxHApdafQt8Ypkd
Malware Config
Signatures
Files
-
8b660cd355734d8c9a373eb1dd1736d40d1811b683219a79ae65831a183daadd.exe windows x86
bc1b3bec8a24b8afb2ffd8e2375d5bda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
kernel32
CreateFileW
GetFileSize
ReadFile
CloseHandle
OpenSemaphoreW
WaitForSingleObject
CreateProcessA
ReleaseSemaphore
GetModuleFileNameW
Sleep
OpenProcess
GetVersionExA
CreateSemaphoreW
GetACP
WriteConsoleW
GetTickCount
CreateProcessW
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetCPInfo
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
CreateFileA
InitializeCriticalSection
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
user32
GetKeyboardState
CharLowerW
GetActiveWindow
advapi32
RegSetValueExW
RegCreateKeyExW
GetUserNameW
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ