Static task
static1
Behavioral task
behavioral1
Sample
a8efeb4cd7b7698e853de492563595a7579e38541ab54c59fba9e325d55ddcbf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8efeb4cd7b7698e853de492563595a7579e38541ab54c59fba9e325d55ddcbf.exe
Resource
win10v2004-20221111-en
General
-
Target
a8efeb4cd7b7698e853de492563595a7579e38541ab54c59fba9e325d55ddcbf
-
Size
117KB
-
MD5
ccb8194c17a7630c92f2dcfa03fef25f
-
SHA1
aafec78c1a83f92535485965d902009bec0e9720
-
SHA256
a8efeb4cd7b7698e853de492563595a7579e38541ab54c59fba9e325d55ddcbf
-
SHA512
ded6a455a24141d5ce6f6d2ec15d70cb877835863958e3fbd89c4e5631efe079da758149ac603239fab309ae55dee415448b93ecd6800629147729070c912687
-
SSDEEP
1536:nZ232eqUXlFRmxstmwQlnJPuKqv1S61xkRQeTBAV5Is8aQPgi:cbrr2sulqR1xkCeTBAV5Is81X
Malware Config
Signatures
Files
-
a8efeb4cd7b7698e853de492563595a7579e38541ab54c59fba9e325d55ddcbf.exe windows x86
ce67399c442437497618ba9701334605
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ExitThread
CreateThread
GlobalAlloc
GlobalFree
GetFileSize
ReadFile
GetModuleFileNameW
CloseHandle
GetLocaleInfoW
GetSystemTimeAsFileTime
lstrlenA
WriteFile
WideCharToMultiByte
lstrcpynW
CreateFileW
lstrlenW
lstrcatW
lstrcpyW
lstrcmpA
lstrcpynA
CreateProcessW
GetTickCount
MultiByteToWideChar
FlushFileBuffers
SetFilePointer
SystemTimeToFileTime
SetFileTime
GetFileAttributesW
GetCurrentDirectoryW
LocalFileTimeToFileTime
FindFirstFileW
FreeLibrary
MoveFileExW
SetEvent
GetModuleHandleW
LoadLibraryW
GetProcAddress
ResetEvent
CreateEventW
FindNextFileW
GetCurrentProcessId
InitializeCriticalSection
GetSystemDirectoryW
LeaveCriticalSection
WaitForSingleObject
FindClose
GetComputerNameA
HeapAlloc
HeapFree
VirtualFree
VirtualAlloc
LoadLibraryA
GetModuleHandleA
GetSystemTime
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
VirtualQuery
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
InitializeCriticalSectionAndSpinCount
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
InterlockedDecrement
ExitProcess
CreateMutexW
DeleteFileW
GetTempPathW
CreateDirectoryW
EnterCriticalSection
GetTempFileNameW
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
SetUnhandledExceptionFilter
HeapCreate
GetLastError
HeapReAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
user32
SetWindowLongW
GetWindowLongW
ShowWindow
CreateWindowExW
LoadCursorW
EnumWindows
SetSysColors
LoadIconW
SystemParametersInfoW
DefWindowProcW
RegisterClassW
EnableWindow
GetWindowThreadProcessId
DestroyWindow
GetMessageW
TranslateMessage
SetWindowPos
IsWindow
GetSystemMetrics
SendMessageW
DispatchMessageW
wsprintfA
ExitWindowsEx
wsprintfW
GetClientRect
gdi32
GetStockObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoInitializeEx
OleInitialize
CoGetClassObject
OleSetContainedObject
oleaut32
VariantClear
VariantInit
SysAllocString
ntdll
RtlUnwind
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ