Static task
static1
Behavioral task
behavioral1
Sample
8c9a77d5b3cd33dd3b2b69c29a87d81634c7d7948f9188df7cf363e1468d65f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c9a77d5b3cd33dd3b2b69c29a87d81634c7d7948f9188df7cf363e1468d65f0.exe
Resource
win10v2004-20220901-en
General
-
Target
8c9a77d5b3cd33dd3b2b69c29a87d81634c7d7948f9188df7cf363e1468d65f0
-
Size
32KB
-
MD5
58b9a248e56423a35a8379423d712930
-
SHA1
30386536832730f806a0eeed8d6de05397f64250
-
SHA256
8c9a77d5b3cd33dd3b2b69c29a87d81634c7d7948f9188df7cf363e1468d65f0
-
SHA512
0ec2cc9e750ffca1286cf8200a8ecfee93cf3a2ec1564c4dc0c46d5b30777d4a216289d529c2c640d33aa896add4c98e5783a1c3275d762f075977bae8bb0bf4
-
SSDEEP
768:nEaGBnmVscp44uzSecqThJRHVdnmxx25cZ2Avd:nELmVpOVThP1dmxx25cRl
Malware Config
Signatures
Files
-
8c9a77d5b3cd33dd3b2b69c29a87d81634c7d7948f9188df7cf363e1468d65f0.exe windows x86
12dbfc0f5c6dcf159cb21c803a5869eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RestoreDC
CreateRectRgn
GetObjectA
GetTextMetricsA
SetBkMode
EndDoc
DeleteDC
GetStockObject
CreateFontIndirectA
StartDocA
CreateSolidBrush
GetTextExtentPoint32A
SelectClipRgn
RectInRegion
SetTextAlign
SaveDC
DeleteObject
CreateDIBSection
CreateRectRgnIndirect
ole32
CoReleaseMarshalData
OleCreate
OleSetMenuDescriptor
OleDraw
OleFlushClipboard
OleLockRunning
OleNoteObjectVisible
OleIsCurrentClipboard
CoAddRefServerProcess
CoCreateGuid
OleGetClipboard
CoGetClassObject
OleCreateLink
OleUninitialize
CoLockObjectExternal
CoUninitialize
CoDosDateTimeToFileTime
CoFreeUnusedLibraries
OleCreateLinkEx
user32
GetWindowThreadProcessId
InvalidateRgn
ModifyMenuA
ChildWindowFromPoint
CheckRadioButton
BeginPaint
CheckDlgButton
SetFocus
IsWindowVisible
PeekMessageA
GetPropA
ReleaseDC
EnumChildWindows
EndDialog
FindWindowA
InflateRect
SendMessageTimeoutA
PostQuitMessage
ScreenToClient
LoadIconA
InsertMenuA
IsDialogMessageA
DeleteMenu
SendMessageA
DestroyIcon
AppendMenuA
DrawIconEx
GetWindowPlacement
PtInRect
GetDoubleClickTime
advapi32
CreateProcessAsUserA
RegCloseKey
LookupAccountNameA
RegDeleteKeyA
GetSecurityInfo
GetTokenInformation
GetSidSubAuthorityCount
InitializeAcl
LookupPrivilegeValueA
GetSidSubAuthority
LookupPrivilegeNameA
LookupAccountSidA
EqualSid
StartServiceA
FreeSid
RegConnectRegistryA
msvcrt
strcpy
__set_app_type
_strtime
wcsrchr
_controlfp
__mb_cur_max
ftell
_wtoi
_wcsnicmp
_wctime
fseek
_beginthread
abs
memcpy
rand
kernel32
SetEvent
TlsSetValue
FatalAppExitA
GetSystemDirectoryA
CompareStringA
GetModuleFileNameA
IsDebuggerPresent
lstrcatA
GetTimeZoneInformation
GetConsoleMode
WaitForMultipleObjects
GetPriorityClass
LocalAlloc
CloseHandle
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winoc Size: 512B - Virtual size: 455B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ