Static task
static1
Behavioral task
behavioral1
Sample
8faa84bbedd8bb891008158ec21def49652f8571f0805bf2f2e41e27f7d96dac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8faa84bbedd8bb891008158ec21def49652f8571f0805bf2f2e41e27f7d96dac.exe
Resource
win10v2004-20220812-en
General
-
Target
8faa84bbedd8bb891008158ec21def49652f8571f0805bf2f2e41e27f7d96dac
-
Size
91KB
-
MD5
866882fcd664ca4eb0c32730af141bc7
-
SHA1
b3cea971e8e530e68b7e4cbaf13d1c00f82c6c49
-
SHA256
8faa84bbedd8bb891008158ec21def49652f8571f0805bf2f2e41e27f7d96dac
-
SHA512
bc40ef66c876ea21da776e14611ce07a954c045fda77226fab772ec11addf5d8b8c17f1f2d158dc3af607940ac9233c501dbc26e6ccbaf4b859fbeb92ddd5a73
-
SSDEEP
1536:rTvH6bhMA2K4LU8ff2UlpcBCeRVuhhzWWyxKjZO4eRICP81jujRO5H1qG5Pirz3T:rT/4hPML32JB1QhztDdbeK+8pujU5D5+
Malware Config
Signatures
Files
-
8faa84bbedd8bb891008158ec21def49652f8571f0805bf2f2e41e27f7d96dac.exe windows x86
c046b0ea83ddaf53317ea19a5b86d06e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
SetWindowPos
UnhookWindowsHookEx
PostQuitMessage
EnumWindows
EqualRect
EnableMenuItem
GetMessageA
FrameRect
GetSysColor
GetScrollPos
SetWindowTextA
GetSubMenu
GetSysColorBrush
kernel32
GetCurrentProcessId
SetUnhandledExceptionFilter
GetFileAttributesA
GetStartupInfoA
GetACP
ExitProcess
GetTempPathA
GetSystemTime
QueryPerformanceCounter
InterlockedExchange
FileTimeToSystemTime
RtlUnwind
GetThreadLocale
VirtualAllocEx
GetTickCount
GetTimeZoneInformation
gdi32
SetViewportExtEx
CopyEnhMetaFileA
DPtoLP
CreateICW
GetMapMode
ExcludeClipRect
SelectClipPath
CreateCompatibleBitmap
FillRgn
ole32
StgOpenStorage
OleRun
CoTaskMemRealloc
CoInitializeSecurity
CoRevokeClassObject
DoDragDrop
CoCreateInstance
CoInitialize
StringFromGUID2
advapi32
RegCreateKeyA
CryptHashData
QueryServiceStatus
RegQueryValueExW
CheckTokenMembership
GetUserNameA
RegCreateKeyExW
AdjustTokenPrivileges
FreeSid
GetSecurityDescriptorDacl
msvcrt
_fdopen
strlen
strncpy
__setusermatherr
fprintf
puts
fflush
raise
_mbscmp
_strdup
signal
_CIpow
__getmainargs
_lock
iswspace
_flsbuf
__initenv
strcspn
comctl32
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Write
ImageList_GetBkColor
ImageList_DragEnter
ImageList_GetIcon
ImageList_SetIconSize
CreatePropertySheetPageA
ImageList_DrawEx
ImageList_LoadImageW
ImageList_ReplaceIcon
ImageList_Destroy
InitCommonControls
shell32
ExtractIconExW
ShellExecuteEx
CommandLineToArgvW
ShellExecuteW
DragQueryFileW
DoEnvironmentSubstW
ExtractIconW
DragAcceptFiles
SHGetPathFromIDList
DragQueryFileA
SHBrowseForFolderA
oleaut32
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SysReAllocStringLen
SafeArrayRedim
SafeArrayCreate
VariantCopy
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE