Static task
static1
Behavioral task
behavioral1
Sample
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe
Resource
win10v2004-20220812-en
General
-
Target
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299
-
Size
822KB
-
MD5
d716445461e280570fdf4f25f375455e
-
SHA1
c212be80c39d7eb73baf78e777b8200ebce2bcbe
-
SHA256
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299
-
SHA512
e81b48322122b344175a7ae41ade5fa53874f84bbcf9122b03b1d10096d840b518b0373471472a73ac3aac425446acc2cd2272ff2e35f005bc390e681ca80d9e
-
SSDEEP
24576:IK+6ujjYHP+UK9x5tiQs3GxD/2LEZJvP41FAQ:vfu55ZIQs3w72LEfo1F
Malware Config
Signatures
Files
-
8c8f9b6cf6259e648788327bf7132ef5b4a2ba3080ca153afc21f55b70e0b299.exe windows x86
8b4c8961258005fa880898882cd56be4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAddAtomToAtomTable
NtPrivilegedServiceAuditAlarm
iswalpha
RtlEnumerateGenericTableLikeADirectory
RtlIsTextUnicode
NtQueryTimer
LdrLoadDll
RtlInitializeGenericTableAvl
_ftol
ZwSuspendProcess
ZwSetInformationFile
RtlFirstFreeAce
RtlAreBitsSet
NtContinue
RtlEqualUnicodeString
NtCreateProcess
RtlLargeIntegerDivide
NtPowerInformation
KiUserExceptionDispatcher
RtlSetIoCompletionCallback
RtlpNtMakeTemporaryKey
RtlQueryInformationActiveActivationContext
NtSetHighEventPair
ZwInitializeRegistry
kernel32
GetThreadTimes
WriteProfileStringW
GetExitCodeProcess
GetExitCodeThread
GetLogicalDrives
GetProfileIntW
CreateProcessInternalA
GetCurrentThread
SetCurrentDirectoryW
InitializeCriticalSection
ConnectNamedPipe
CmdBatNotification
SetCommMask
DuplicateHandle
GetCurrentProcess
GetLocaleInfoA
GetTimeZoneInformation
GetSystemTimeAsFileTime
Module32First
LoadLibraryW
DebugBreak
RegisterConsoleOS2
MoveFileExW
GetComputerNameW
GetDefaultCommConfigW
GetModuleHandleW
HeapSummary
WritePrivateProfileStringW
oleaut32
SafeArrayLock
UnRegisterTypeLib
VarI1FromDec
VarDateFromUdate
OaBuildVersion
SysReAllocString
VarUI4FromDec
LHashValOfNameSys
VarDecAdd
VarR8FromStr
wininet
FtpCreateDirectoryW
FtpGetFileSize
SetUrlCacheGroupAttributeW
InternetQueryDataAvailable
InternetInitializeAutoProxyDll
InternetDialW
InternetOpenA
FindNextUrlCacheContainerW
RetrieveUrlCacheEntryFileW
InternetClearAllPerSiteCookieDecisions
CreateUrlCacheContainerA
InternetTimeFromSystemTime
GetUrlCacheEntryInfoA
InternetTimeToSystemTimeA
InternetQueryOptionW
InternetTimeToSystemTime
msdart
??0CReaderWriterLock2@@QAE@XZ
?_RemoveThisFromGlobalList@CLKRHashTable@@AAEXXZ
?_TryReadLock@CReaderWriterLock2@@AAE_NXZ
??4CCritSec@@QAEAAV0@ABV0@@Z
?IsValid@CLKRHashTable@@QBE_NXZ
?sm_lpOSVERSIONINFO@CMdVersionInfo@@0PAU_OSVERSIONINFOW@@A
?sm_dblDfltSpinAdjFctr@CSmallSpinLock@@1NA
??0CSpinLock@@QAE@XZ
?InsertHead@CDoubleList@@QAEXQAVCListEntry@@@Z
?SetBucketLockSpinCount@CLKRHashTable@@QAEXG@Z
user32
DdePostAdvise
DdeQueryNextServer
SetLastErrorEx
MenuWindowProcW
EnumDisplayDevicesW
BeginDeferWindowPos
PeekMessageW
GetNextDlgGroupItem
MapDialogRect
OpenDesktopA
SetUserObjectInformationW
EnumPropsW
GetMenuItemInfoW
HiliteMenuItem
GetFocus
GetMouseMovePointsEx
Sections
.text Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 197KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ