Static task
static1
Behavioral task
behavioral1
Sample
8c7cc5b17aa942d539324d2efde39d6488a8fb40eebf06325ad5f61e2479b1bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c7cc5b17aa942d539324d2efde39d6488a8fb40eebf06325ad5f61e2479b1bc.exe
Resource
win10v2004-20220812-en
General
-
Target
8c7cc5b17aa942d539324d2efde39d6488a8fb40eebf06325ad5f61e2479b1bc
-
Size
109KB
-
MD5
1fa8e2596f14a338ca9ac04b2796c98f
-
SHA1
8505d52e68d5955de3d6c720e4b686550681ac72
-
SHA256
8c7cc5b17aa942d539324d2efde39d6488a8fb40eebf06325ad5f61e2479b1bc
-
SHA512
f3e465615cd59685b661af1a1a4abce1604673ee8bacd00b04cfdf7047777a60bfb253ab1a2573d1795da3411e0ba7a6d890ad5f9efa0aa8be5c0d8cab20b2d4
-
SSDEEP
3072:irrrbUoOW/iahKZ3NxunnX6kCFb6HKpH:icoOW/92Nxunn4Fb
Malware Config
Signatures
Files
-
8c7cc5b17aa942d539324d2efde39d6488a8fb40eebf06325ad5f61e2479b1bc.exe windows x86
24de9de82c9ab6827d81739012e85b97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetVersion
CreateProcessW
OpenProcess
LocalAlloc
GlobalFree
GetTempFileNameA
GetWindowsDirectoryA
GlobalUnlock
LoadResource
GetTempPathW
SetFileAttributesA
SetFileAttributesW
FileTimeToLocalFileTime
GlobalAlloc
LCMapStringA
GetTempPathA
GetStartupInfoW
SetFilePointer
MultiByteToWideChar
IsDebuggerPresent
lstrcmpiA
LocalFileTimeToFileTime
LCMapStringW
ExpandEnvironmentStringsA
GetConsoleOutputCP
GetOEMCP
CreateFileMappingA
FileTimeToDosDateTime
VirtualProtect
DeleteFileA
GetFileAttributesA
GetUserDefaultLangID
GetCommandLineW
GetLocalTime
GetSystemTime
Sleep
GetThreadLocale
GetModuleHandleA
RemoveDirectoryA
lstrcmpA
GetModuleHandleW
CreateDirectoryA
GetProcessHeap
GetExitCodeProcess
GetFileAttributesW
GetCurrentDirectoryA
GetEnvironmentStringsW
GlobalReAlloc
SetStdHandle
GetShortPathNameA
msvcrt
__setusermatherr
__p___initenv
_initterm
_except_handler3
__p__fmode
_XcptFilter
__getmainargs
_exit
__set_app_type
__p__commode
_adjust_fdiv
_controlfp
advapi32
FreeSid
RegSetValueExW
CryptAcquireContextA
EqualSid
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyA
CryptDestroyHash
IsValidSid
RegEnumValueW
AdjustTokenPrivileges
CloseServiceHandle
RegDeleteValueW
CryptGenRandom
InitiateSystemShutdownA
OpenServiceA
GetTokenInformation
OpenSCManagerA
RegCreateKeyA
LookupPrivilegeValueA
CryptCreateHash
RegDeleteKeyA
OpenThreadToken
GetLengthSid
SetSecurityDescriptorDacl
RegFlushKey
RegCreateKeyExW
OpenServiceW
GetUserNameA
RegQueryValueExA
RegEnumKeyW
RegEnumValueA
user32
TrackPopupMenu
GetMenuStringA
OpenClipboard
RemovePropA
PostMessageA
CallWindowProcA
GetDesktopWindow
GetWindowLongA
GetClassInfoA
GetMenuItemID
GetSystemMenu
FrameRect
GetWindowPlacement
GetMessageA
ReleaseDC
SetClipboardData
SetScrollInfo
KillTimer
PostQuitMessage
SetRect
CloseClipboard
ClientToScreen
EqualRect
GetDlgItem
WaitMessage
RegisterWindowMessageA
OemToCharA
SetClassLongA
EmptyClipboard
PeekMessageA
GetScrollInfo
LoadBitmapA
CreatePopupMenu
SendMessageA
RedrawWindow
SetTimer
GetSysColorBrush
IsWindowEnabled
DrawMenuBar
GetClientRect
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ