Static task
static1
Behavioral task
behavioral1
Sample
8831f1ef2e9ce8762ced84d6d5adc6702b5ad0ff6f1798b9b8842ec281cdd646.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8831f1ef2e9ce8762ced84d6d5adc6702b5ad0ff6f1798b9b8842ec281cdd646.exe
Resource
win10v2004-20221111-en
General
-
Target
8831f1ef2e9ce8762ced84d6d5adc6702b5ad0ff6f1798b9b8842ec281cdd646
-
Size
88KB
-
MD5
22b40907277faafbfcc92c6a59ec1a80
-
SHA1
54c71d4e7536a21018f03bb6ddd36b2c7a66c305
-
SHA256
8831f1ef2e9ce8762ced84d6d5adc6702b5ad0ff6f1798b9b8842ec281cdd646
-
SHA512
1e50d1daf45e469d36d544426d79f94e6264db5df385fb1f2663d2b93fc8b737b58042fdf690b1bd54d0fa3546adb9f52a7c03c92ee6af322b2b6a8934937595
-
SSDEEP
1536:GmBA7Smu0XPXotDSWkGhM0tTBdGoBk5TXa62Al1UJZ9T3eFNJIhsjzxGM:JBAOmuzlvAo2c62A/8T38IrM
Malware Config
Signatures
Files
-
8831f1ef2e9ce8762ced84d6d5adc6702b5ad0ff6f1798b9b8842ec281cdd646.exe windows x86
50c384a652c3ed82472dc187c827d385
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyA
RegDeleteValueA
kernel32
GetFileType
ExitProcess
WriteFile
lstrcpyA
GetLastError
VirtualQuery
GetStringTypeA
GetVersionExA
VirtualFree
SetThreadLocale
LoadLibraryA
GetFileSize
LoadResource
ExitThread
WaitForSingleObject
GetACP
GetStdHandle
FindClose
VirtualAllocEx
SetEndOfFile
lstrcmpiA
GetCurrentThreadId
RaiseException
LocalAlloc
GetCurrentThread
GetFullPathNameA
GetVersion
VirtualAlloc
ReadFile
GetModuleHandleA
GetLocaleInfoA
GetSystemDefaultLangID
FindFirstFileA
lstrcmpA
MoveFileExA
CloseHandle
EnterCriticalSection
CreateThread
HeapAlloc
lstrlenA
Sleep
GetProcAddress
GetDiskFreeSpaceA
LockResource
GlobalAddAtomA
GlobalAlloc
LocalFree
GetThreadLocale
SetHandleCount
FormatMessageA
GlobalDeleteAtom
InitializeCriticalSection
GetModuleFileNameA
GetCPInfo
GetCurrentProcess
SetLastError
CompareStringA
GetTickCount
LoadLibraryExA
CreateEventA
GetOEMCP
oleaut32
SysFreeString
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
VariantCopyInd
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ole32
CoUnmarshalInterface
OleRun
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CreateBindCtx
StringFromIID
CoReleaseMarshalData
CoRegisterClassObject
CLSIDFromString
CLSIDFromProgID
msvcrt
memcpy
atan
memmove
malloc
strncmp
user32
DrawIcon
GetMenuState
GetMenuStringA
GetScrollPos
CallNextHookEx
GetSysColorBrush
SetWindowTextA
GetDC
FillRect
GetActiveWindow
GetDesktopWindow
GetParent
GetWindow
GetScrollRange
GetCursor
DispatchMessageW
DrawEdge
GetSubMenu
EnableMenuItem
GetMessagePos
CreatePopupMenu
GetScrollInfo
GetMenuItemInfoA
IsWindowVisible
EqualRect
CreateIcon
IsChild
IsWindowEnabled
GetWindowTextA
GetPropA
GetSysColor
EnumWindows
GetMenuItemID
DrawMenuBar
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ