Static task
static1
Behavioral task
behavioral1
Sample
8edc537b9c415f4937bb20a269233950f8649b80cc7d6a6dfec81118410a5d96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8edc537b9c415f4937bb20a269233950f8649b80cc7d6a6dfec81118410a5d96.exe
Resource
win10v2004-20221111-en
General
-
Target
8edc537b9c415f4937bb20a269233950f8649b80cc7d6a6dfec81118410a5d96
-
Size
127KB
-
MD5
0c489a25c828ed247d1094d76d9f42ab
-
SHA1
166faf563d8e7b2cf4e8b08f2febc05ceed5fad1
-
SHA256
8edc537b9c415f4937bb20a269233950f8649b80cc7d6a6dfec81118410a5d96
-
SHA512
1f581b3af38a5effce0802bf4096d1f973e1458608b2085e955901e26d28d3260c683de9aeeb46bbeed87181f043ead2403a270d8248173e5d71c3ee15429f1d
-
SSDEEP
3072:+zZj0R95OuaIGx6sY65VvMoncKFCLvidmAjo:+zZe95OuhGwgHBcKoAo
Malware Config
Signatures
Files
-
8edc537b9c415f4937bb20a269233950f8649b80cc7d6a6dfec81118410a5d96.exe windows x86
97a5be7a5b48c552654b3cca0bf54f7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WritePrivateProfileSectionA
VirtualQueryEx
VirtualUnlock
GetCurrentThread
GetProfileStringA
GetProcAddress
CreateDirectoryA
EraseTape
GetNamedPipeInfo
WritePrivateProfileStringA
HeapFree
EndUpdateResourceA
VirtualFree
QueryPerformanceCounter
GetProfileIntA
GetPriorityClass
PeekNamedPipe
CreateMutexA
VirtualAllocEx
GetFullPathNameA
GetSystemDefaultLangID
WaitForSingleObject
AreFileApisANSI
GetThreadPriority
LockFile
Sleep
GlobalFlags
GetLongPathNameA
GetUserDefaultUILanguage
AllocConsole
CloseHandle
SizeofResource
GetCurrentProcess
DeviceIoControl
DisconnectNamedPipe
MulDiv
AddAtomA
CreateIoCompletionPort
OpenMutexA
OpenProcess
VirtualProtectEx
GetFileAttributesA
CommConfigDialogA
GetNamedPipeHandleStateA
FindAtomA
CreateSemaphoreA
OpenSemaphoreA
GetThreadSelectorEntry
GetThreadLocale
CancelIo
GetPrivateProfileStringA
GetLocalTime
GlobalReAlloc
GetDiskFreeSpaceA
FreeConsole
GetProfileSectionA
DosDateTimeToFileTime
SetFileAttributesA
WaitNamedPipeA
GlobalAddAtomA
ClearCommBreak
MapViewOfFile
GetProcessHeaps
LocalLock
FindResourceA
GetSystemDirectoryA
GlobalFindAtomA
WriteFile
WideCharToMultiByte
FindFirstChangeNotificationA
GetModuleHandleA
GlobalFix
FreeResource
FindCloseChangeNotification
WaitForSingleObjectEx
GetPrivateProfileIntA
FlushConsoleInputBuffer
SleepEx
GetDriveTypeA
OutputDebugStringA
IsBadReadPtr
GlobalUnWire
CreateRemoteThread
IsBadHugeWritePtr
GetExitCodeProcess
IsBadCodePtr
LocalFree
GetCurrentThreadId
ReadFile
ReleaseMutex
GetConsoleCP
OpenFileMappingA
GetLastError
GetEnvironmentStrings
GlobalSize
FindResourceExA
InitAtomTable
QueueUserAPC
GetLogicalDrives
DeleteAtom
GetSystemDefaultLCID
PulseEvent
IsBadHugeReadPtr
GetTickCount
GlobalHandle
HeapValidate
GetFileSize
CreateFileA
LocalUnlock
GetCommModemStatus
LocalShrink
LocalCompact
LocalAlloc
DefineDosDeviceA
GetMailslotInfo
OpenEventA
PurgeComm
GlobalWire
GetBinaryTypeA
GetOEMCP
PeekConsoleInputA
VirtualQuery
FindNextChangeNotification
LocalReAlloc
MultiByteToWideChar
GetThreadContext
CreateMailslotA
WriteProfileSectionA
GlobalFree
IsBadWritePtr
IsProcessorFeaturePresent
ReleaseSemaphore
MapViewOfFileEx
GetStdHandle
CopyFileExA
GetVersion
DuplicateHandle
WaitForMultipleObjectsEx
QueryDosDeviceA
GetACP
GetPrivateProfileStructA
GetProcessAffinityMask
UnlockFile
GetSystemDefaultUILanguage
GetCommandLineA
GetStartupInfoA
msvcrt
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE