Static task
static1
Behavioral task
behavioral1
Sample
c8b82178b5d397a3fd27be1084cc462dcaed200f350670e300f5abbef2315bcb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8b82178b5d397a3fd27be1084cc462dcaed200f350670e300f5abbef2315bcb.exe
Resource
win10v2004-20221111-en
General
-
Target
c8b82178b5d397a3fd27be1084cc462dcaed200f350670e300f5abbef2315bcb
-
Size
184KB
-
MD5
8e1169660a5d56eb5c098cfb5af700cc
-
SHA1
c3d9f673745ef39458dd4a525ca13d4a709ae04d
-
SHA256
c8b82178b5d397a3fd27be1084cc462dcaed200f350670e300f5abbef2315bcb
-
SHA512
49a1e02b687a77f80436963abfebb14bb90fb394e7708f284aa0300c9a5e623ca2aea21435db8a3d3011bbd57e4aac0870f3e6db92e86bb9510565ef24030f4d
-
SSDEEP
3072:eS39kXc5QPpfbvPflDJ9rKLS+quOZULIPvrOWjH0I7oJhgkr78zRCSm8:eS3n5QPpz3nBKLTq5LOk0w0gx
Malware Config
Signatures
Files
-
c8b82178b5d397a3fd27be1084cc462dcaed200f350670e300f5abbef2315bcb.exe windows x86
0e09601e25aa74dd18e4c940507051a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegLoadKeyA
kernel32
VirtualAlloc
GetACP
GetLastError
LocalReAlloc
SetThreadLocale
GetModuleHandleA
GetCommandLineA
LocalAlloc
InitializeCriticalSection
ExitProcess
lstrcmpiA
GetFileAttributesA
GetProcAddress
LoadLibraryA
GetLocalTime
Sleep
ReadFile
lstrcpynA
GetModuleFileNameA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
FindTextA
gdi32
GetCurrentPositionEx
version
VerInstallFileA
VerQueryValueA
VerFindFileA
ole32
CreateOleAdviseHolder
ReleaseStgMedium
user32
IsRectEmpty
BeginPaint
InsertMenuA
IsChild
RegisterClipboardFormatA
DrawMenuBar
GetMenuStringA
CharLowerBuffA
GetActiveWindow
DrawEdge
EmptyClipboard
EnableScrollBar
GetClipboardData
RegisterWindowMessageA
ShowScrollBar
GetKeyState
GetClassLongA
GetClassNameA
DrawIconEx
OpenClipboard
DeleteMenu
WindowFromPoint
GetCursorPos
CharToOemA
GetDlgItem
GetSystemMetrics
CharNextA
GetSysColor
UnhookWindowsHookEx
MapWindowPoints
GetMenu
DestroyMenu
EnableWindow
wsprintfA
CheckMenuItem
TranslateMessage
DefWindowProcA
GetWindowDC
GetScrollRange
EnableMenuItem
SetWindowTextA
SetScrollRange
GetMenuItemID
CreateMenu
OffsetRect
SetActiveWindow
GetWindowPlacement
GetLastActivePopup
MapVirtualKeyA
IsWindowVisible
GetDC
PeekMessageA
WaitMessage
SetScrollPos
GetDesktopWindow
TranslateMDISysAccel
DispatchMessageA
PeekMessageW
GetIconInfo
GetClassInfoA
GetSysColorBrush
GetClientRect
IsWindowUnicode
ScreenToClient
DestroyIcon
GetPropA
DrawAnimatedRects
LoadCursorA
EqualRect
MessageBoxA
DrawIcon
GetParent
GetScrollPos
GetCursor
CreateWindowExA
ReleaseCapture
SetWindowPos
SendMessageA
SetScrollInfo
CallNextHookEx
GetWindowLongW
AdjustWindowRectEx
IsDialogMessageW
GetFocus
SetForegroundWindow
SetWindowLongW
GetTopWindow
DispatchMessageW
IsWindow
SetRect
SetClipboardData
LoadIconA
RemovePropA
UpdateWindow
GetKeyboardType
GetKeyNameTextA
RedrawWindow
FrameRect
GetMenuItemCount
CreatePopupMenu
FindWindowA
CharNextW
EnumThreadWindows
GetWindowThreadProcessId
InsertMenuItemA
GetKeyboardLayoutNameA
MessageBeep
InvalidateRect
ReleaseDC
GetDCEx
EnumWindows
SetWindowsHookExA
SetCapture
OemToCharA
EndPaint
ClientToScreen
InflateRect
IsZoomed
CloseClipboard
GetMenuItemInfoA
SendMessageW
GetKeyboardLayout
SetParent
GetWindow
GetKeyboardState
DrawFrameControl
MoveWindow
GetWindowTextA
DestroyCursor
LoadBitmapA
SetWindowLongA
DefMDIChildProcA
CreateIcon
GetMenuState
TrackPopupMenu
CallWindowProcA
IsWindowEnabled
PostQuitMessage
MsgWaitForMultipleObjects
GetScrollInfo
SetCursor
ScrollWindow
GetWindowRect
SystemParametersInfoA
GetKeyboardLayoutList
DefFrameProcA
CharUpperBuffA
DestroyWindow
ChildWindowFromPoint
SetWindowPlacement
IsDialogMessageA
ActivateKeyboardLayout
GetCapture
GetSubMenu
SetTimer
SetPropA
SetMenu
RegisterClassA
CharLowerA
PostMessageA
SetFocus
UnregisterClassA
DrawTextA
EnumChildWindows
GetSystemMenu
LoadKeyboardLayoutA
GetForegroundWindow
SetMenuItemInfoA
RemoveMenu
KillTimer
FillRect
shell32
SHGetDiskFreeSpaceA
SHGetFileInfoA
SHGetDesktopFolder
DragQueryFileA
SHGetFolderPathA
Sections
CODE Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 539B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ