Static task
static1
Behavioral task
behavioral1
Sample
8bac8ad34ea4b7f7ba078fb27b44affbee585436e28311b154c8030e9fd87d01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8bac8ad34ea4b7f7ba078fb27b44affbee585436e28311b154c8030e9fd87d01.exe
Resource
win10v2004-20220812-en
General
-
Target
8bac8ad34ea4b7f7ba078fb27b44affbee585436e28311b154c8030e9fd87d01
-
Size
309KB
-
MD5
eb90cc91b45bf122d7dc854872edaf3c
-
SHA1
5ddd33dee312a45bbcbf478b78d48383cfae4d71
-
SHA256
8bac8ad34ea4b7f7ba078fb27b44affbee585436e28311b154c8030e9fd87d01
-
SHA512
9d88372113e183d1ab79ca3774c51232deb5a8ee78ee799baf8fc5710d110b6f4ea3a1d7f32ad061e5d8cb6923bdeb7d29bd4fc43b98013393e04b992f88502d
-
SSDEEP
6144:yXZrFVFgL3xD7CU4C9SeZmYqN0M3KLa+N7MPgyUih2MNZOo:yp9qxxuS7LN8g8h2MNZO
Malware Config
Signatures
Files
-
8bac8ad34ea4b7f7ba078fb27b44affbee585436e28311b154c8030e9fd87d01.exe windows x86
25f5f5e4e7b34ea4562a54d2607fba60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
CloseHandle
GetModuleHandleA
GetDriveTypeA
Sleep
FreeConsole
FindClose
SetLastError
ReleaseMutex
CreateMutexA
GetTickCount
LoadLibraryExA
GetComputerNameA
VirtualProtect
DeleteCriticalSection
TlsGetValue
GetLastError
EnumResourceTypesA
GetDiskFreeSpaceExW
GetCommandLineA
shell32
SHGetSettings
DragAcceptFiles
DragFinish
SheChangeDirA
SHGetNewLinkInfo
StrChrA
SHGetMalloc
ShellMessageBoxA
SHFree
DllUnregisterServer
ShellAboutA
SHGetDiskFreeSpaceA
DragQueryFileA
msports
ComDBClaimPort
ComDBClose
ComDBOpen
ComDBReleasePort
PortsClassInstaller
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ