Static task
static1
Behavioral task
behavioral1
Sample
8cb31c2dc2a174d926a3b772c6bf0e8983ea4e2c62303d3ad8b0ef34cc7b7d3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8cb31c2dc2a174d926a3b772c6bf0e8983ea4e2c62303d3ad8b0ef34cc7b7d3e.exe
Resource
win10v2004-20221111-en
General
-
Target
8cb31c2dc2a174d926a3b772c6bf0e8983ea4e2c62303d3ad8b0ef34cc7b7d3e
-
Size
234KB
-
MD5
d5463d4b7b88fa28e99e53c2c431b5b1
-
SHA1
7a2fb88390e43191bf4ece486c8d45ed7d8e6983
-
SHA256
8cb31c2dc2a174d926a3b772c6bf0e8983ea4e2c62303d3ad8b0ef34cc7b7d3e
-
SHA512
cabca5d79449be4e592048945ec818b286b97eb8e224881fd33c9da759badcc7c615191b9ecbcdda1c4c7423123a977aba4e8e55acdf1415a18deca5762ce4e2
-
SSDEEP
6144:qTrVoOo+VArkZdwdwL3NdcrN4/BKDR7KjXtlmL0Dx:qTr6x+JyodoN4odKQ0Dx
Malware Config
Signatures
Files
-
8cb31c2dc2a174d926a3b772c6bf0e8983ea4e2c62303d3ad8b0ef34cc7b7d3e.exe windows x86
af3a442c3ee6f6a77cb2c983913febe6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
HeapFree
InterlockedDecrement
FreeEnvironmentStringsW
SetLastError
InterlockedIncrement
TlsFree
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetACP
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetCPInfo
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LockResource
LoadLibraryA
GetFileSize
GetProcAddress
ReadFile
GetPrivateProfileStringW
LoadResource
SetEndOfFile
FreeResource
FindResourceA
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
HeapCreate
GetModuleFileNameW
GetStdHandle
HeapAlloc
GetLastError
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
IsProcessorFeaturePresent
user32
CloseClipboard
DestroyAcceleratorTable
GetSystemMenu
SetActiveWindow
GetMenuItemID
IsZoomed
GetSubMenu
GetFocus
IsClipboardFormatAvailable
GetParent
SetParent
FindWindowW
SetFocus
ModifyMenuW
GetMenu
SetRect
CreateAcceleratorTableA
ReleaseDC
EmptyClipboard
GetMenuState
LoadAcceleratorsA
SetMenu
GetActiveWindow
GetMenuItemCount
RemoveMenu
SetMenuDefaultItem
InsertMenuW
OpenClipboard
AdjustWindowRectEx
MessageBoxW
LoadImageA
SetClipboardData
FindWindowA
CopyRect
GrayStringA
gdi32
RectVisible
GetBitmapBits
SetBitmapBits
SetViewportOrgEx
CreateDIBSection
GetDIBits
ResetDCA
CreateRectRgnIndirect
RectInRegion
Rectangle
SetDIBits
ScaleViewportExtEx
GetBkColor
SetViewportExtEx
CreateDIBitmap
GetStockObject
OffsetViewportOrgEx
GetTextColor
RestoreDC
advapi32
RegDeleteValueW
GetSecurityDescriptorDacl
AdjustTokenPrivileges
RegEnumKeyExW
RegOpenKeyA
FreeSid
RegEnumValueW
AllocateAndInitializeSid
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegDeleteKeyW
InitializeSecurityDescriptor
RegQueryInfoKeyW
EqualSid
RegEnumKeyW
GetTokenInformation
OpenThreadToken
OpenProcessToken
shell32
ShellAboutA
ShellExecuteW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExW
Shell_NotifyIconW
SHGetDesktopFolder
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ