Static task
static1
Behavioral task
behavioral1
Sample
8f0400f8a71753d2accb2f44c96b0c57dceee6c9ddf489d7bda3e8c8120ecb75.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f0400f8a71753d2accb2f44c96b0c57dceee6c9ddf489d7bda3e8c8120ecb75.exe
Resource
win10v2004-20220812-en
General
-
Target
8f0400f8a71753d2accb2f44c96b0c57dceee6c9ddf489d7bda3e8c8120ecb75
-
Size
187KB
-
MD5
f7e4ecde9f14bd5aa2b803f12ff4594f
-
SHA1
16c6f7f1b2204d1db36102c1fde458f1a739bc96
-
SHA256
8f0400f8a71753d2accb2f44c96b0c57dceee6c9ddf489d7bda3e8c8120ecb75
-
SHA512
db638cef89e3789316ab0d2582ab6be3ef28dc124eb83ece1e646c4676007f0eaf5cbaeb76cacccef689a2a26f3906f59fc998b451449da66bdf3f3aeab8a117
-
SSDEEP
3072:0/vFcjywT0n74enVFVhT8oXol3XWF37XcvmF6RzoAytqm3zcCPz13W8DnkTWD+n5:0/tcj0n7jVFVhtXol2FrXmVzoAyEHCPo
Malware Config
Signatures
Files
-
8f0400f8a71753d2accb2f44c96b0c57dceee6c9ddf489d7bda3e8c8120ecb75.exe windows x86
c890681c23c1ee1ca55eeeab849b038f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
IsDlgButtonChecked
EnableWindow
DestroyWindow
GetDC
WinHelpA
CreateDialogParamA
SendMessageA
GetDialogBaseUnits
GetDlgItem
UnregisterClassA
CheckDlgButton
SetDlgItemTextA
SetWindowLongA
IsWindow
ReleaseDC
GetDlgItemTextA
MoveWindow
IsDialogMessageA
CharNextA
kernel32
HeapDestroy
GetTickCount
GetLocaleInfoA
SetHandleInformation
GetModuleHandleA
WideCharToMultiByte
lstrlenW
FreeLibrary
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetOEMCP
GetACP
InterlockedIncrement
UnhandledExceptionFilter
MultiByteToWideChar
RtlUnwind
GetEnvironmentStringsW
TlsGetValue
HeapReAlloc
TransmitCommChar
GetVersionExA
lstrcatA
SetHandleCount
DisableThreadLibraryCalls
GetProcessHeap
FreeEnvironmentStringsA
GetCPInfo
GetCurrentThreadId
lstrcmpiA
HeapAlloc
HeapCreate
TlsSetValue
GetCurrentProcessId
VirtualAlloc
GetStringTypeW
lstrcpynA
RaiseException
WriteFile
FreeEnvironmentStringsW
ExitProcess
GetSystemTimeAsFileTime
IsBadReadPtr
InterlockedExchange
InterlockedDecrement
VirtualQuery
EnumResourceNamesW
GetEnvironmentStrings
TerminateProcess
LoadResource
IsBadCodePtr
GetCurrentProcess
VirtualFree
DeleteCriticalSection
QueryPerformanceCounter
SetLastError
LCMapStringA
EnterCriticalSection
HeapSize
GetStdHandle
GetProcAddress
LoadLibraryA
FlushInstructionCache
MulDiv
GetLastError
TlsFree
ExitProcess
InitializeCriticalSection
FindResourceA
VirtualProtect
GetCommandLineA
GetStartupInfoA
LeaveCriticalSection
SizeofResource
LockResource
GetSystemInfo
TlsAlloc
GetThreadLocale
LCMapStringW
lstrlenA
IsBadWritePtr
LoadLibraryExA
GetModuleFileNameA
SetStdHandle
IsDBCSLeadByte
SetFilePointer
CloseHandle
lstrcpyA
GetStringTypeA
HeapFree
msimg32
AlphaBlend
TransparentBlt
gdi32
GetTextExtentPointA
GetTextMetricsA
SelectObject
DeleteObject
GetDeviceCaps
CreateFontIndirectA
shlwapi
PathFindExtensionA
ole32
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
advapi32
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ