Static task
static1
Behavioral task
behavioral1
Sample
8c93f1710e3125f3394fb73b3c142f193f0e0eebc74b09e9f7df666d3a1f2382.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c93f1710e3125f3394fb73b3c142f193f0e0eebc74b09e9f7df666d3a1f2382.exe
Resource
win10v2004-20220812-en
General
-
Target
8c93f1710e3125f3394fb73b3c142f193f0e0eebc74b09e9f7df666d3a1f2382
-
Size
200KB
-
MD5
55626f12209791f3260cfbc2904bbdb5
-
SHA1
22ed6469b6b31690bbf08f686dc045032b809f01
-
SHA256
8c93f1710e3125f3394fb73b3c142f193f0e0eebc74b09e9f7df666d3a1f2382
-
SHA512
3e3765591f4b115a7bf94435006e83c5678e9ce288374e4edeb6b6a0870c2813428d4a49d8cdabb537f6f41b374e89e391030f3bdf2ae14ae88cdc38a519306b
-
SSDEEP
3072:GYUy7/1naShk7coJ7iOF0L77zqm6Xok/sJCn8/XeyP:J57paShI7GWokNnyp
Malware Config
Signatures
Files
-
8c93f1710e3125f3394fb73b3c142f193f0e0eebc74b09e9f7df666d3a1f2382.exe windows x86
7511fadec6d827dc26f528e4c0939bf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
MapViewOfFile
CreateFileMappingA
CloseHandle
GetFileSize
CreateFileA
SetFileAttributesW
MultiByteToWideChar
lstrlenA
CopyFileA
DeleteFileA
GetFileTime
FindNextFileA
SetFileAttributesA
lstrcpynA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
GetModuleFileNameA
GetTempFileNameA
GetTempPathA
ReadFile
SetFilePointer
CreateDirectoryA
GetCurrentProcess
FormatMessageA
GetLastError
ExitProcess
UnmapViewOfFile
SetCurrentDirectoryA
GetWindowsDirectoryA
SetFileTime
SystemTimeToFileTime
CreateProcessA
GetSystemDirectoryA
CreateThread
CreateMutexA
CreateSemaphoreA
Sleep
VirtualFree
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GetDriveTypeA
GetLogicalDriveStringsA
ReleaseSemaphore
OpenSemaphoreA
GetComputerNameA
GetShortPathNameA
lstrcmpA
GetVersion
CompareStringW
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
FindFirstFileA
FindClose
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetSystemTime
SetErrorMode
WinExec
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
HeapAlloc
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
HeapFree
HeapReAlloc
TerminateProcess
WideCharToMultiByte
LCMapStringA
user32
PostQuitMessage
wsprintfA
ShowWindow
DialogBoxParamA
EndDialog
advapi32
RegSetValueExA
RegCloseKey
RegRestoreKeyA
RegOpenKeyExA
RegSaveKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
shlwapi
PathQuoteSpacesA
ws2_32
WSACleanup
inet_addr
gethostbyname
WSAStartup
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bcbqhus Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE