Static task
static1
Behavioral task
behavioral1
Sample
8b7fd8e974bddea60d7beffbdcbb4ac90dca799387dd9cfae2fbe62e0169ae7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b7fd8e974bddea60d7beffbdcbb4ac90dca799387dd9cfae2fbe62e0169ae7b.exe
Resource
win10v2004-20221111-en
General
-
Target
8b7fd8e974bddea60d7beffbdcbb4ac90dca799387dd9cfae2fbe62e0169ae7b
-
Size
340KB
-
MD5
403c9654e174b236f1934e8282b0a454
-
SHA1
0cf070c07138bfd0c293f43c239ec52be7574f75
-
SHA256
8b7fd8e974bddea60d7beffbdcbb4ac90dca799387dd9cfae2fbe62e0169ae7b
-
SHA512
aef81eef8e46f5bf756cbb74f34fa8e3bd04d6086531b50cbdc1e559d79695bc4817bcefd32e656b99541e59b6b840a145c8c98d50d07a768729b30aad501ce2
-
SSDEEP
6144:EfdeACitHGIurx3ZFz6ETHlAr9krGZ2Gap3j6ignXV4PQ+UlVTDwFUq:TiLkhDz6wHlg9qGZ2baXV4RUv1q
Malware Config
Signatures
Files
-
8b7fd8e974bddea60d7beffbdcbb4ac90dca799387dd9cfae2fbe62e0169ae7b.exe windows x86
c30f3c2b75f1d4cb7e240c28aea38e79
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
ExitProcess
GetThreadContext
GetCurrentProcess
Process32First
GetTickCount
GetCurrentThread
VirtualFree
OpenProcess
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
Process32Next
GetSystemInfo
GetModuleHandleA
IsDebuggerPresent
VirtualProtect
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
CloseHandle
CheckRemoteDebuggerPresent
SetThreadContext
OpenMutexA
GetModuleFileNameA
CreateMutexA
ResumeThread
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetCurrentThreadId
InterlockedExchange
user32
MessageBoxA
msvcr90
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_amsg_exit
fseek
ftell
fread
fopen
rewind
free
malloc
fclose
memset
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ