Static task
static1
Behavioral task
behavioral1
Sample
8e05c7483559f639d140ddeb3bed774166cdaf8e633ce92abdb82588427c1035.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e05c7483559f639d140ddeb3bed774166cdaf8e633ce92abdb82588427c1035.exe
Resource
win10v2004-20220812-en
General
-
Target
8e05c7483559f639d140ddeb3bed774166cdaf8e633ce92abdb82588427c1035
-
Size
81KB
-
MD5
4e31200176ca5a45ed0c581365dd2b41
-
SHA1
c2de93757063031ee804303018bab6701e0ea932
-
SHA256
8e05c7483559f639d140ddeb3bed774166cdaf8e633ce92abdb82588427c1035
-
SHA512
a6c914e048677be63cb9d747b6d2933c3ce815723724369912b891d0f6c9e850fdcc0ca9962e043910f35145ad07a4e92ffbcddefa846cf792e24d08a1b88b38
-
SSDEEP
1536:MT5LdcPVrp/1dxf2CyUGQlQvGMsi2MwhaFQ74RX9r:MNdqVrp/1fWYvMsi28FJRX
Malware Config
Signatures
Files
-
8e05c7483559f639d140ddeb3bed774166cdaf8e633ce92abdb82588427c1035.exe windows x86
19f053f149d8cfe388035e9bb20d1770
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
GetMenuStringW
OpenClipboard
DestroyIcon
GetActiveWindow
UnregisterClassA
LoadIconA
DestroyMenu
TrackPopupMenu
GetClientRect
ReleaseDC
SetWindowPos
InflateRect
RegisterClassW
LoadStringW
SendMessageW
CheckMenuItem
GetSubMenu
CreateWindowExW
SetActiveWindow
PostMessageW
GetCursorPos
SetWindowTextW
AllowSetForegroundWindow
GetMenu
MoveWindow
GetWindowLongW
SetCapture
GetWindowTextLengthA
PtInRect
kernel32
TlsSetValue
WideCharToMultiByte
TlsGetValue
GetModuleFileNameA
LeaveCriticalSection
TryEnterCriticalSection
GetModuleHandleW
MultiByteToWideChar
CreateThread
SetFilePointer
SetUnhandledExceptionFilter
SetLastError
CreateFileA
InterlockedCompareExchange
EnterCriticalSection
GetStartupInfoW
ReadFile
GetFileSizeEx
InterlockedExchange
GetCurrentThreadId
LoadLibraryA
FreeLibraryAndExitThread
IsDebuggerPresent
GetACP
GetModuleFileNameW
GetCurrentProcessId
SetEvent
ExitProcess
CreateFileW
GetProcessHeap
GetLastError
GetModuleHandleA
GetProcAddress
HeapReAlloc
GetStdHandle
FreeLibrary
DeleteCriticalSection
GetSystemTimeAsFileTime
GetTickCount
InterlockedIncrement
HeapFree
WaitForSingleObject
GetCurrentProcess
TlsAlloc
GetVersionExA
GetEnvironmentStringsW
GetVersionExW
FindClose
GetFileSize
WaitForSingleObjectEx
RaiseException
SetFilePointerEx
GetFileType
InitializeCriticalSectionAndSpinCount
Sleep
InitializeCriticalSection
InterlockedDecrement
LocalFree
TerminateProcess
HeapAlloc
WriteFile
FlushFileBuffers
CloseHandle
QueryPerformanceCounter
shlwapi
PathRemoveExtensionW
SHGetValueW
PathStripToRootW
PathFileExistsA
PathFindExtensionA
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecA
PathFileExistsW
StrStrIA
PathRelativePathToW
SHDeleteValueW
PathCanonicalizeW
PathIsRootW
StrStrIW
StrCmpW
PathIsRelativeW
StrCmpIW
StrCmpNW
PathAddBackslashA
PathAppendW
PathRemoveFileSpecW
PathAppendA
PathAddBackslashW
SHDeleteKeyW
StrToIntExW
AssocQueryStringW
PathRenameExtensionW
SHCreateStreamOnFileW
PathIsURLW
PathRemoveBlanksW
StrToIntW
PathCommonPrefixW
PathIsDirectoryW
PathCombineW
StrCmpNIW
PathFindFileNameA
PathRemoveBackslashW
PathStripPathW
StrStrW
PathIsUNCW
PathIsFileSpecW
setupapi
SetupQueryInfFileInformationA
msvcrt
_onexit
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
strlen
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ