Static task
static1
Behavioral task
behavioral1
Sample
8da1caeea44832ac193765f25af5bfe5dedf4d8418f069795e9686047d3637db.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8da1caeea44832ac193765f25af5bfe5dedf4d8418f069795e9686047d3637db.exe
Resource
win10v2004-20220901-en
General
-
Target
8da1caeea44832ac193765f25af5bfe5dedf4d8418f069795e9686047d3637db
-
Size
793KB
-
MD5
b1fd45f3a0f5692d646ed66baba80bd4
-
SHA1
46f365d89ce689270c525db0a2ac9e1f8df333fb
-
SHA256
8da1caeea44832ac193765f25af5bfe5dedf4d8418f069795e9686047d3637db
-
SHA512
84d9b32d3ba5e810692dff0ba488ec2a3f8df4a18e121fad8cfecb1c31c269b720a4825116ba8f3e7c98ab43edd90c3eec246f2b1fadaa3ca2869e59101704f8
-
SSDEEP
24576:8VA3/LecsLdxS/lpCK5U6Gmus/dDEeRZ3rb6k6Z:0OVsROpnu6G1YZ3KZ
Malware Config
Signatures
Files
-
8da1caeea44832ac193765f25af5bfe5dedf4d8418f069795e9686047d3637db.exe windows x86
c556fe0e3ac5067b05c06f179fc88309
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
DeleteFileW
GlobalFree
CreateSemaphoreA
WriteConsoleA
lstrlenA
SetLastError
CloseHandle
GetTickCount
Sleep
HeapSize
CreateMutexA
LoadLibraryA
CreateHardLinkW
GetProcessHeap
GetFileAttributesA
CreateDirectoryW
GetStartupInfoA
SetLastError
VirtualProtectEx
SetEvent
cryptui
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
vdmdbg
VDMBreakThread
VDMGetContext
VDMDetectWOW
VDMGetPointer
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 785KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE