Static task
static1
Behavioral task
behavioral1
Sample
8d24ff77d5b578daf8600733c0818ce56ae3eaf5a32d7cc028e69be2320d5783.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d24ff77d5b578daf8600733c0818ce56ae3eaf5a32d7cc028e69be2320d5783.exe
Resource
win10v2004-20221111-en
General
-
Target
8d24ff77d5b578daf8600733c0818ce56ae3eaf5a32d7cc028e69be2320d5783
-
Size
125KB
-
MD5
b36aa16732e2bc9059cbd7cf6c23b5df
-
SHA1
2ca52c09ba97936c77d527ba3e044c079b72792d
-
SHA256
8d24ff77d5b578daf8600733c0818ce56ae3eaf5a32d7cc028e69be2320d5783
-
SHA512
c3e6a22e5a87001860f3af0d13d595abd13a509cec4b909808aaaa0b3c8827682c45c7530c2585c4471a8494bd906c4b1dd7c15fa1306713edf9edafdbf587d8
-
SSDEEP
3072:zS79SEsI6i8QBJPqEI2vGqndtnUfIZrJGEx39h:zREsBAhHqqvEcGE3
Malware Config
Signatures
Files
-
8d24ff77d5b578daf8600733c0818ce56ae3eaf5a32d7cc028e69be2320d5783.exe windows x86
727c5f8e20369a364cfebc11e86e0804
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessTimes
SignalObjectAndWait
DeleteFiber
GetProcAddress
GetPrivateProfileSectionNamesA
LocalAlloc
QueryPerformanceCounter
GetBinaryTypeA
FindResourceExA
UnmapViewOfFile
GetSystemDefaultLangID
GetFileInformationByHandle
GetVersion
GetWindowsDirectoryA
WriteFile
CreateFiber
GetTickCount
IsBadWritePtr
GetSystemDefaultUILanguage
GetCommandLineA
GlobalReAlloc
FindFirstChangeNotificationA
OutputDebugStringA
GetThreadLocale
GetConsoleOutputCP
CopyFileExA
GetLogicalDrives
VirtualAlloc
GetConsoleCP
GetProcessVersion
WaitForSingleObjectEx
MoveFileExA
FreeLibrary
PostQueuedCompletionStatus
SleepEx
GetCPInfoExA
LocalFree
CreateIoCompletionPort
LockResource
GetStdHandle
GlobalFix
GetPrivateProfileSectionA
GetProfileStringA
SizeofResource
MapViewOfFileEx
GlobalLock
PeekNamedPipe
GetACP
GetFileTime
VirtualProtect
AddAtomA
SetEvent
GetLongPathNameA
CreateDirectoryA
GetPrivateProfileStructA
GetProcessAffinityMask
MapViewOfFile
VirtualFree
OpenFileMappingA
GetFileSize
GlobalAlloc
LocalReAlloc
HeapCreate
DuplicateHandle
IsBadHugeWritePtr
CallNamedPipeA
InitAtomTable
FreeResource
GetProfileSectionA
GetLastError
MulDiv
GetFileType
GetCurrentProcessId
GetCPInfo
SearchPathA
GetLocalTime
GetDiskFreeSpaceExA
GetCommModemStatus
EndUpdateResourceA
ClearCommError
AllocConsole
LoadLibraryExA
CreateWaitableTimerA
SetFileAttributesA
GetThreadPriorityBoost
CreateMutexA
UpdateResourceA
GetHandleInformation
LoadResource
GlobalWire
GetDiskFreeSpaceA
PulseEvent
GetFullPathNameA
VirtualProtectEx
IsProcessorFeaturePresent
Beep
QueryDosDeviceA
GetUserDefaultLCID
GetExitCodeThread
GlobalCompact
SetFileTime
WritePrivateProfileSectionA
GetCurrentProcess
WriteProfileSectionA
FlushViewOfFile
VirtualFreeEx
SetLastError
RemoveDirectoryA
GetProcessHeap
HeapAlloc
CreateEventA
UnlockFile
IsDebuggerPresent
MoveFileA
GetEnvironmentVariableA
FindAtomA
GetProfileIntA
WaitNamedPipeA
GetPrivateProfileStringA
GlobalFlags
GetCurrentThread
SetFilePointer
LocalSize
CloseHandle
MultiByteToWideChar
WaitForMultipleObjectsEx
FoldStringA
ReadProcessMemory
PeekConsoleInputA
IsSystemResumeAutomatic
LocalHandle
ReleaseMutex
HeapDestroy
GetModuleHandleA
DeleteAtom
GetVolumeInformationA
FlushInstructionCache
VirtualLock
CancelIo
GetCommMask
FreeConsole
GetSystemDirectoryA
OpenEventA
GetPrivateProfileIntA
WritePrivateProfileStringA
DisconnectNamedPipe
GlobalFindAtomA
GetEnvironmentStrings
GetStartupInfoA
msvcrt
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE