Static task
static1
Behavioral task
behavioral1
Sample
8f4d4e78cb733f2d06f161f58ae5c2e9ab50daa772444d67bd5bfd15b06708bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f4d4e78cb733f2d06f161f58ae5c2e9ab50daa772444d67bd5bfd15b06708bf.exe
Resource
win10v2004-20221111-en
General
-
Target
8f4d4e78cb733f2d06f161f58ae5c2e9ab50daa772444d67bd5bfd15b06708bf
-
Size
20KB
-
MD5
ab2e6013734cbde378bff653e7bf5943
-
SHA1
96137a9188d1ee865680cc1bd813a3c1c3aa9e22
-
SHA256
8f4d4e78cb733f2d06f161f58ae5c2e9ab50daa772444d67bd5bfd15b06708bf
-
SHA512
95a3f75c8ead26070681aa9473d20509dcf38020d8d904f7734a2d784b5826c59f3ed5b431b36eb7fa41b66fae85d03ca95653fd671900cfc64b3e2d66b8ff83
-
SSDEEP
384:/janeHsFXKuqirj9e/bj1W35xXC9nWJM8K2Q7RPK5G3QKQlU1iU9sU2Xh:/jaQsIuVrjUW35pC9nW/K28BQKQy19ox
Malware Config
Signatures
Files
-
8f4d4e78cb733f2d06f161f58ae5c2e9ab50daa772444d67bd5bfd15b06708bf.exe windows x86
7b668c3d610fd16b444c6c2d9b0adc47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord389
ord5207
ord825
ord924
ord2764
ord4129
ord858
ord800
ord5710
ord2915
ord941
ord536
ord3178
ord4058
ord2781
ord668
ord610
ord1187
ord818
ord567
ord3742
ord4424
ord4627
ord4080
ord3079
ord3825
ord690
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord2818
ord860
ord356
ord287
ord6139
ord540
ord2770
msvcrt
free
strlen
strcpy
atoi
memset
__CxxFrameHandler
_EH_prolog
strncpy
strcat
strtok
_strnicmp
memcpy
malloc
strcmp
sprintf
fclose
fwrite
fopen
fread
_stat
_except_handler3
kernel32
GetFileSize
GlobalUnlock
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
GlobalReAlloc
GetCurrentThreadId
GlobalSize
GlobalLock
GetDriveTypeA
WriteFile
PeekNamedPipe
GetLastError
ExitThread
DisconnectNamedPipe
DuplicateHandle
GetVersionExA
CreatePipe
WaitForMultipleObjects
TerminateThread
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
GetModuleHandleA
lstrcmpiA
CopyFileA
WinExec
LoadLibraryA
GetProcAddress
lstrlenA
lstrcatA
GetModuleFileNameA
CreateFileA
GlobalAlloc
ReadFile
GlobalFree
OpenProcess
TerminateProcess
CloseHandle
DeleteFileA
GetSystemDirectoryA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
ExitProcess
CreateThread
WaitForSingleObject
Sleep
user32
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetProcessWindowStation
GetWindowRect
SetCursorPos
mouse_event
keybd_event
ExitWindowsEx
wsprintfA
GetSystemMetrics
ReleaseDC
GetWindowDC
IsWindow
SetWindowLongA
GetDC
EnableWindow
GetDesktopWindow
SendMessageA
MoveWindow
gdi32
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateCompatibleBitmap
DeleteObject
SelectObject
BitBlt
CreateCompatibleDC
GetStockObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
avicap32
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICInfo
ws2_32
connect
WSAGetLastError
htons
inet_addr
WSAStartup
socket
send
closesocket
__WSAFDIsSet
select
recv
winmm
timeGetTime
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE