Static task
static1
Behavioral task
behavioral1
Sample
8c35351e7b69a1450e94ead3e11b054ac7110fec050e858fd8d7e5747708877e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c35351e7b69a1450e94ead3e11b054ac7110fec050e858fd8d7e5747708877e.exe
Resource
win10v2004-20220812-en
General
-
Target
8c35351e7b69a1450e94ead3e11b054ac7110fec050e858fd8d7e5747708877e
-
Size
127KB
-
MD5
b2c6380c2f3cd9e6c890d5e3cd718096
-
SHA1
003493be1e987d21be4bc5cff43cbc8d69513d58
-
SHA256
8c35351e7b69a1450e94ead3e11b054ac7110fec050e858fd8d7e5747708877e
-
SHA512
48ed98e8d242761db4cd0f588b3a8e36d39a25dd98ccd5a5e368164af92c26cb40733c386e7c54c2445dc6f89e6300e85eee8f07916dedfbe1df6bccd2781895
-
SSDEEP
3072:fRIT5zNb8hJfI5GBDmbU8mzc3rmK6LuSp/Rmq:ZkN8Q5Dr8tKiuImq
Malware Config
Signatures
Files
-
8c35351e7b69a1450e94ead3e11b054ac7110fec050e858fd8d7e5747708877e.exe windows x86
3bdf3a6e0ae18cec7aae16b48e38e275
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocalTime
GetUserDefaultUILanguage
GetLongPathNameA
GetProcessTimes
GetProcAddress
FlushInstructionCache
IsBadStringPtrA
DefineDosDeviceA
GetModuleHandleA
GetFullPathNameA
GlobalSize
GlobalAddAtomA
IsBadHugeReadPtr
LocalUnlock
SetFileTime
FreeLibrary
AddAtomA
DuplicateHandle
VirtualAlloc
RemoveDirectoryA
PulseEvent
GetProcessHeap
HeapAlloc
FormatMessageA
GetThreadPriority
AllocConsole
MapViewOfFileEx
EndUpdateResourceA
HeapValidate
CopyFileExA
OpenFileMappingA
DeleteFileA
AreFileApisANSI
LoadResource
WaitForSingleObject
GetExitCodeProcess
ReadConsoleA
MulDiv
SetEvent
LocalHandle
FindResourceExA
ResetEvent
VirtualFree
GlobalHandle
DisconnectNamedPipe
CopyFileA
DosDateTimeToFileTime
SizeofResource
CreateEventA
WriteProfileSectionA
GetACP
HeapReAlloc
GetSystemDefaultLCID
LocalFlags
GetExitCodeThread
WriteFile
SleepEx
CreateDirectoryA
GetHandleInformation
GlobalReAlloc
GlobalFix
FlushFileBuffers
GetCommTimeouts
CreateSemaphoreA
FindCloseChangeNotification
GetCPInfo
GetFileAttributesA
WaitNamedPipeA
VirtualQuery
CreateConsoleScreenBuffer
VirtualAllocEx
GetCurrentProcessId
GetConsoleCP
GetLogicalDriveStringsA
LockFile
ConnectNamedPipe
WaitForSingleObjectEx
CommConfigDialogA
VirtualQueryEx
VirtualUnlock
VirtualFreeEx
PeekConsoleInputA
WideCharToMultiByte
QueryPerformanceCounter
WriteProfileStringA
LocalShrink
Beep
GetStdHandle
GetConsoleOutputCP
GlobalUnWire
GetPriorityClass
SetFileAttributesA
GetLargestConsoleWindowSize
GetSystemDirectoryA
GlobalCompact
WaitForMultipleObjectsEx
LocalReAlloc
GetCommandLineA
GetShortPathNameA
GetCommMask
GlobalAlloc
IsSystemResumeAutomatic
GetPrivateProfileStructA
GetProcessAffinityMask
GetVersion
GetThreadSelectorEntry
ReleaseSemaphore
GetDiskFreeSpaceA
ClearCommError
GetCommConfig
PeekNamedPipe
GlobalLock
GetCPInfoExA
MoveFileA
VirtualProtectEx
GetLogicalDrives
GetMailslotInfo
GetUserDefaultLCID
MapViewOfFile
MultiByteToWideChar
WriteProcessMemory
InitAtomTable
FlushConsoleInputBuffer
UnmapViewOfFile
GetNamedPipeHandleStateA
FindFirstChangeNotificationA
ContinueDebugEvent
WritePrivateProfileStructA
CreateFiber
GetOEMCP
GetProfileStringA
GetThreadTimes
VirtualLock
GetProcessHeaps
HeapDestroy
FreeConsole
GlobalFindAtomA
GetConsoleCursorInfo
GetPrivateProfileStringA
GetStartupInfoA
msvcrt
time
srand
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE