Static task
static1
Behavioral task
behavioral1
Sample
b8799287cffbe20e23abdfe9e41d3550cca0c1efbbb65b1dbc1e30675ce60e8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8799287cffbe20e23abdfe9e41d3550cca0c1efbbb65b1dbc1e30675ce60e8c.exe
Resource
win10v2004-20221111-en
General
-
Target
b8799287cffbe20e23abdfe9e41d3550cca0c1efbbb65b1dbc1e30675ce60e8c
-
Size
210KB
-
MD5
351678297267ee0837699cc33f43f271
-
SHA1
0330fb5129ae29426c4de00af663063af4cce455
-
SHA256
b8799287cffbe20e23abdfe9e41d3550cca0c1efbbb65b1dbc1e30675ce60e8c
-
SHA512
f92147eea8e40b54bb7573c4c51a00f48a4fc2b226dbfaa152c2aff3c0959f7bf2f90411a5336d7765e3d6c2bf0166d6b557515372899c01d25db348f0aac04d
-
SSDEEP
1536:qJmhW/LK9YSD6BWayYi5RwjY2YuVLTNQDfqiZhzA:p8LKdD2WayJ5UAjqiZh8
Malware Config
Signatures
Files
-
b8799287cffbe20e23abdfe9e41d3550cca0c1efbbb65b1dbc1e30675ce60e8c.exe windows x86
ec32b117fdb7682eb504dda2f3254efe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
HeapDestroy
GetProcAddress
GetModuleFileNameA
GetCurrentProcess
UnhandledExceptionFilter
VirtualAlloc
InterlockedDecrement
CloseHandle
HeapAlloc
LoadLibraryA
GetSystemTimeAsFileTime
lstrcpyW
Sleep
WriteFile
lstrcpyW
GetModuleFileNameA
VirtualFree
GetTickCount
GetModuleHandleW
GetStartupInfoA
GetModuleHandleW
TerminateProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
lstrlenW
FreeLibrary
GetModuleHandleA
HeapFree
ExitProcess
SetLastError
lstrcmpiW
GetCommandLineA
TerminateProcess
GetCommandLineA
GetCurrentProcessId
GetCommandLineW
LoadLibraryW
HeapReAlloc
GetCurrentProcess
GetCommandLineA
VirtualAlloc
TerminateProcess
GetTickCount
InterlockedDecrement
MultiByteToWideChar
SetFilePointer
GetTickCount
GetStartupInfoW
ExitProcess
lstrlenW
GetProcessHeap
FormatMessageW
GetTickCount
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
HeapAlloc
GetCurrentProcessId
GetVersionExA
VirtualFree
WriteFile
GetModuleFileNameA
SetFilePointer
InterlockedDecrement
GetStartupInfoW
SetFilePointer
DeleteCriticalSection
ReadFile
LocalFree
FormatMessageW
WideCharToMultiByte
CreateThread
WideCharToMultiByte
UnhandledExceptionFilter
lstrcmpiW
ReadFile
GetTickCount
LocalAlloc
LeaveCriticalSection
LocalFree
LoadLibraryA
GetTickCount
WaitForSingleObject
SetFilePointer
HeapDestroy
WideCharToMultiByte
GetCommandLineW
GetLastError
GetProcessHeap
LocalFree
CreateThread
HeapDestroy
ExitProcess
GetCurrentProcessId
CreateThread
FreeLibrary
FormatMessageW
lstrlenW
GetCommandLineA
FormatMessageW
GetProcAddress
GetVersionExA
GetProcessHeap
FreeLibrary
SetLastError
GetACP
WideCharToMultiByte
GetModuleHandleA
CloseHandle
lstrcpyW
HeapReAlloc
SetLastError
UnhandledExceptionFilter
CreateFileW
Sleep
GetCommandLineW
HeapDestroy
FreeLibrary
FormatMessageW
GetCommandLineA
UnhandledExceptionFilter
InterlockedIncrement
CreateThread
GetModuleFileNameA
CloseHandle
GetStartupInfoA
HeapAlloc
CreateFileW
GetCurrentProcess
SetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetACP
lstrlenW
HeapAlloc
EnterCriticalSection
EnterCriticalSection
QueryPerformanceCounter
SetLastError
GetStartupInfoA
lstrcpyW
GetSystemTimeAsFileTime
EnterCriticalSection
SetUnhandledExceptionFilter
VirtualFree
CloseHandle
CreateFileW
GetSystemTimeAsFileTime
LoadLibraryA
VirtualAlloc
GetCommandLineA
GetLastError
SetFilePointer
lstrcpyW
GetACP
GetProcessHeap
GetProcAddress
LeaveCriticalSection
ExitProcess
LocalAlloc
LoadLibraryA
WideCharToMultiByte
GetProcessHeap
CreateFileW
LocalAlloc
CloseHandle
InterlockedDecrement
InterlockedDecrement
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetACP
UnhandledExceptionFilter
HeapReAlloc
InitializeCriticalSection
GetModuleHandleW
VirtualFree
FormatMessageW
GetStartupInfoW
lstrcpyW
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
ReadFile
LocalFree
lstrcpyW
Sleep
LoadLibraryA
SetEvent
InitializeCriticalSection
GetCommandLineA
FreeLibrary
GetCurrentProcess
EnterCriticalSection
MultiByteToWideChar
HeapAlloc
EnterCriticalSection
GetCurrentProcess
DeleteCriticalSection
SetLastError
GetStartupInfoW
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
ExitProcess
GetCurrentProcess
GetModuleHandleW
Sections
�text Size: 185KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE