Static task
static1
Behavioral task
behavioral1
Sample
8e086d922d5caf7139d4753eeac000a6bb87c94a2221fcf840fc9e82a3020bb4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e086d922d5caf7139d4753eeac000a6bb87c94a2221fcf840fc9e82a3020bb4.exe
Resource
win10v2004-20221111-en
General
-
Target
8e086d922d5caf7139d4753eeac000a6bb87c94a2221fcf840fc9e82a3020bb4
-
Size
392KB
-
MD5
def854557ce319892104491b312ad8bc
-
SHA1
2aa950e1b8b735738b6f9e96ceddc79d2c2d9420
-
SHA256
8e086d922d5caf7139d4753eeac000a6bb87c94a2221fcf840fc9e82a3020bb4
-
SHA512
e0a379eaf1fa00b25ee41bb07197c49d5b915df1b6be38fa7f811166b5d4c7fff43b25ca3b10d85570c53dfc4653326f7985e4afdbe969f51be6a5914a84e88a
-
SSDEEP
6144:l0VYU1wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4B9qxD:lA/ApUvsfRh+ajZCBAMXoUK0VHQqxD
Malware Config
Signatures
Files
-
8e086d922d5caf7139d4753eeac000a6bb87c94a2221fcf840fc9e82a3020bb4.exe windows x86
d670425fc7e8d35c79f53ab59c6a2361
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateFileA
ReleaseMutex
GetACP
GetEnvironmentVariableA
CreateMutexA
TlsGetValue
HeapDestroy
ExitThread
LocalUnlock
HeapCreate
GlobalFree
GetProcessHeap
FindClose
SetLastError
FindResourceA
SetConsoleCursorInfo
GetModuleHandleA
UnmapViewOfFile
LoadLibraryExW
user32
GetFocus
DrawEdge
GetIconInfo
DefWindowProcW
DispatchMessageA
IsWindow
GetDlgItem
CopyRect
FillRect
GetDC
DrawMenuBar
CallWindowProcA
CheckRadioButton
uxtheme
DrawThemeText
DrawThemeEdge
GetThemeSysInt
GetThemeRect
DrawThemeIcon
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ