Static task
static1
Behavioral task
behavioral1
Sample
8bdd11fce95d3a34b13d2771d73185469c74561dbbd31cc7f414afc27b92d0df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8bdd11fce95d3a34b13d2771d73185469c74561dbbd31cc7f414afc27b92d0df.exe
Resource
win10v2004-20220901-en
General
-
Target
8bdd11fce95d3a34b13d2771d73185469c74561dbbd31cc7f414afc27b92d0df
-
Size
169KB
-
MD5
7e5a1aa02fbaaae17324ccf04f2d779d
-
SHA1
3ef5f1fd389a3e6de950fda5da2f3f6ad2cec091
-
SHA256
8bdd11fce95d3a34b13d2771d73185469c74561dbbd31cc7f414afc27b92d0df
-
SHA512
fbb64555fcc1f61feee1cb1e07a4dcbfe76f4cd6833a94d8724d139a9848ed13056936223a1c85bf6149842388e472f43c26081e3775ead22d4d40b41601745c
-
SSDEEP
3072:23IaG3GvqMxUCL8p81EsRnmkfym8l9/6vxeRMFPpywjPRabvDOVsuwLU:2D/vP3iWEynmkf98lBeeOpPjIHOV6
Malware Config
Signatures
Files
-
8bdd11fce95d3a34b13d2771d73185469c74561dbbd31cc7f414afc27b92d0df.exe windows x86
c7b0cb5ab6f0ed81ee4e67424964dcf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_wcsnicmp
RtlDeleteCriticalSection
atol
user32
GetDesktopWindow
CheckMenuItem
GetFocus
DrawEdge
EnableWindow
GetMenuStringA
IsDialogMessageA
IsChild
GetMessagePos
BeginDeferWindowPos
GetClientRect
DefWindowProcA
EqualRect
IsMenu
FrameRect
GetIconInfo
GetClassLongA
DrawIconEx
DrawMenuBar
GetScrollRange
DrawIcon
DispatchMessageW
ShowScrollBar
ShowWindow
GetMenuState
SetTimer
GetCursor
GetMenuItemID
CharNextA
CreatePopupMenu
GetKeyNameTextA
TrackPopupMenu
EnableMenuItem
DrawTextA
EndPaint
ClientToScreen
GetLastActivePopup
GetSysColor
CreateMenu
GetDlgItem
GetKeyState
GetScrollInfo
GetScrollPos
GetCapture
GetActiveWindow
SetCursor
GetDC
DispatchMessageA
HideCaret
EnableScrollBar
FindWindowA
GetMenuItemInfoA
GetClipboardData
EnumThreadWindows
DefMDIChildProcA
CharLowerBuffA
CharLowerA
SetWindowTextA
GetWindow
GetSubMenu
GetClassInfoA
RegisterClassA
EnumWindows
SetWindowPos
GetMenu
SetWindowLongA
SystemParametersInfoA
GetParent
CallWindowProcA
EndDeferWindowPos
CharToOemA
IsWindowVisible
GetDCEx
DefFrameProcA
GetSysColorBrush
CreateIcon
msvcrt
tolower
memset
atol
strncmp
calloc
strlen
strcmp
memmove
sqrt
memcpy
wcschr
malloc
kernel32
lstrcatA
GetSystemDefaultLangID
MoveFileExA
GetCurrentThread
DeleteFileA
GetThreadLocale
GetEnvironmentStrings
GetUserDefaultLCID
MoveFileA
GlobalFindAtomA
GlobalAddAtomA
GetLastError
GetLocalTime
EnterCriticalSection
CreateFileA
GetModuleFileNameA
lstrcpyA
GetFileSize
SetHandleCount
FormatMessageA
GetOEMCP
HeapFree
GetStringTypeA
GetLocaleInfoA
GlobalDeleteAtom
SetLastError
LoadLibraryA
CompareStringA
LocalAlloc
FreeResource
lstrcmpiA
WaitForSingleObject
SetFilePointer
LoadLibraryExA
GetDateFormatA
GetVersionExA
CloseHandle
GetCommandLineA
GetProcAddress
GetTickCount
FindResourceA
RaiseException
LocalReAlloc
VirtualFree
GetCurrentProcess
GetModuleHandleA
ExitThread
lstrlenA
SizeofResource
InitializeCriticalSection
DeleteCriticalSection
MulDiv
WriteFile
GetDiskFreeSpaceA
GetCurrentThreadId
GetCPInfo
CreateThread
GlobalAlloc
VirtualAllocEx
lstrcpynA
WideCharToMultiByte
GetVersion
SetThreadLocale
Sleep
FindClose
VirtualAlloc
GetProcessHeap
lstrcmpA
GetACP
GetStartupInfoA
LocalFree
EnumCalendarInfoA
ExitProcess
FindFirstFileA
LockResource
ole32
OleRun
CoTaskMemFree
CLSIDFromProgID
StgOpenStorage
CLSIDFromString
CoRegisterClassObject
GetHGlobalFromStream
CreateBindCtx
StgCreateDocfileOnILockBytes
Sections
CODE Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE