Static task
static1
Behavioral task
behavioral1
Sample
8f9f984ee655fcad5e2a7a7734261fcc5906a8451f7bf08d1d71ec199a6a39a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f9f984ee655fcad5e2a7a7734261fcc5906a8451f7bf08d1d71ec199a6a39a9.exe
Resource
win10v2004-20220901-en
General
-
Target
8f9f984ee655fcad5e2a7a7734261fcc5906a8451f7bf08d1d71ec199a6a39a9
-
Size
126KB
-
MD5
9e4a5834af38854d54a83e7af4905cfc
-
SHA1
57b9534ca136313a08936641c3785f01ccf1c424
-
SHA256
8f9f984ee655fcad5e2a7a7734261fcc5906a8451f7bf08d1d71ec199a6a39a9
-
SHA512
cef88fd9ce6f15ea587e23541d22dd6ec14f6f9827f6f9ba287d43f85bcbf3170f82706c014b8168ae18a876050701e709d916a548233753667f3b7fbd4b8843
-
SSDEEP
3072:BcVDawygRdsiogFuhgkYTGbq9hJYQP6mnJZXsfRy:QTLdfFuhc6bqCC6SZXs
Malware Config
Signatures
Files
-
8f9f984ee655fcad5e2a7a7734261fcc5906a8451f7bf08d1d71ec199a6a39a9.exe windows x86
6c970091987046bb2d33b8f4da60438c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
VirtualAlloc
IsBadWritePtr
GetProcAddress
GetProcessHeap
HeapAlloc
GetCPInfoExA
GetModuleHandleA
FoldStringA
QueryPerformanceCounter
VirtualFreeEx
LocalCompact
UpdateResourceA
HeapValidate
CloseHandle
GetPrivateProfileIntA
SetFilePointer
GetPrivateProfileSectionNamesA
GlobalHandle
WideCharToMultiByte
FindResourceA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
VirtualAllocEx
CreateFileMappingA
FindClose
GetThreadSelectorEntry
LocalReAlloc
FreeLibrary
GetNamedPipeHandleStateA
UnlockFile
GetUserDefaultUILanguage
OpenFileMappingA
GetProcessHeaps
VirtualQuery
GetSystemDefaultLCID
GetCommTimeouts
GetLogicalDriveStringsA
FindFirstChangeNotificationA
CreateFileA
WritePrivateProfileStringA
WritePrivateProfileStructA
FreeConsole
OpenEventA
GetProcessWorkingSetSize
InitAtomTable
GetDiskFreeSpaceExA
GlobalFree
GetProcessVersion
PeekConsoleInputA
GetCommModemStatus
GetSystemDefaultUILanguage
GetLogicalDrives
FlushFileBuffers
GetThreadLocale
LoadResource
GetVolumeInformationA
FreeResource
DefineDosDeviceA
GetProfileSectionA
GlobalFix
ReleaseMutex
CancelWaitableTimer
GetDriveTypeA
GetThreadTimes
IsBadReadPtr
LocalSize
GetFileAttributesA
GetEnvironmentStrings
WriteProcessMemory
GetFullPathNameA
ReadProcessMemory
GetThreadPriorityBoost
WriteProfileStringA
HeapFree
GlobalUnWire
ClearCommBreak
CreateRemoteThread
DeviceIoControl
MapViewOfFile
GetProfileStringA
GetNamedPipeInfo
GetUserDefaultLCID
GetThreadPriority
ResetEvent
GlobalLock
GetLongPathNameA
CreateDirectoryExA
LocalHandle
CreateMutexA
VirtualFree
WaitNamedPipeA
IsDebuggerPresent
OpenMutexA
OpenProcess
GlobalCompact
GetEnvironmentVariableA
LocalLock
DeleteFiber
CreateSemaphoreA
GetFileTime
WriteFile
FindCloseChangeNotification
GetProfileIntA
GetCommandLineA
LocalFree
LocalUnlock
VirtualProtectEx
SizeofResource
GetFileInformationByHandle
PeekNamedPipe
CommConfigDialogA
BeginUpdateResourceA
MoveFileA
FormatMessageA
GetLocalTime
HeapReAlloc
GetConsoleOutputCP
FlushInstructionCache
PulseEvent
GetTickCount
GetFileSize
FindNextChangeNotification
ClearCommError
GetMailslotInfo
GetPrivateProfileStringA
WaitForSingleObjectEx
GetHandleInformation
IsBadHugeReadPtr
IsProcessorFeaturePresent
GetOEMCP
EraseTape
LoadLibraryExA
PurgeComm
GetStartupInfoA
msvcrt
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE