Static task
static1
Behavioral task
behavioral1
Sample
a8fd37b922ce31b1f14c677913d9199cad487e42f8bf60bab3765ac4e7eee783.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8fd37b922ce31b1f14c677913d9199cad487e42f8bf60bab3765ac4e7eee783.exe
Resource
win10v2004-20220812-en
General
-
Target
a8fd37b922ce31b1f14c677913d9199cad487e42f8bf60bab3765ac4e7eee783
-
Size
140KB
-
MD5
d9986b2bf55d57232fc217def2a69ddc
-
SHA1
a8fbbf3348e581cee30bd2d3c3721690e37518ce
-
SHA256
a8fd37b922ce31b1f14c677913d9199cad487e42f8bf60bab3765ac4e7eee783
-
SHA512
e3b87570cc7f3c0e2230888d0b89befd75082b871631892691d9ebf54ef8fbd4cd98e647c1fb1b49b386a0cd77f4f31fd0f0fc3575a9b2014b24328efc761bc5
-
SSDEEP
3072:3ZRLwZoxZXWYpNurM7gddJns+4cYgnyejWTKY9+dU:3DpZx7gdPQ3Ddv
Malware Config
Signatures
Files
-
a8fd37b922ce31b1f14c677913d9199cad487e42f8bf60bab3765ac4e7eee783.exe windows x86
d6df39296d85f4bb2fb35e050731020c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord2991
ord4261
ord3317
ord572
ord764
ord2086
ord1545
ord4232
ord3164
ord354
ord1794
ord4541
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord757
ord566
ord2248
ord911
ord784
ord876
ord2322
ord1617
ord2372
ord1063
ord3255
ord334
ord5214
ord6168
ord5563
ord2272
ord4085
ord304
ord5833
ord1161
ord5119
ord4353
ord3182
ord2657
ord5807
ord6067
ord4749
ord709
ord501
ord3684
ord3337
ord760
ord416
ord651
ord1565
ord6205
ord675
ord548
ord442
ord628
ord378
ord4044
ord1191
ord1187
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1620
ord4240
ord1402
ord5915
ord1591
ord2095
ord1084
ord4580
ord310
ord6090
ord578
ord587
ord1207
ord741
ord605
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3441
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord593
ord3946
ord762
ord3641
msvcr71
_mbslwr
__CxxFrameHandler
_snprintf
_splitpath
sprintf
malloc
free
_resetstkoflw
_except_handler3
wcscpy
_mbsnbcpy
memset
__dllonexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
??1type_info@@UAE@XZ
_setmbcp
realloc
_stricmp
strtok
iswspace
isdigit
strncmp
strchr
_controlfp
?terminate@@YAXXZ
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
strncat
_wcsupr
atoi
__getmainargs
_amsg_exit
_acmdln
_ismbcdigit
wcslen
_vsnprintf
strlen
_mbschr
_mbsnbcat
_mbspbrk
_mbsrchr
_mbsstr
_mbscmp
_mbsicmp
_mbsnbcmp
_mbsnbicmp
_mbslen
_mbsinc
_onexit
_mbsupr
_mbclen
_CxxThrowException
_mbctype
_strupr
_strlwr
strcpy
strstr
strrchr
strpbrk
strcmp
memmove
isspace
strcat
_ismbcspace
memcpy
kernel32
QueryPerformanceCounter
ExitProcess
GetStartupInfoA
GetModuleHandleA
RaiseException
LoadLibraryExA
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiW
lstrlenW
lstrcmpiA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
CreateEventA
GetLastError
CreateThread
WaitForMultipleObjects
GetTickCount
WaitForSingleObject
GetCurrentProcess
GetCurrentThreadId
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetShortPathNameA
GetModuleFileNameA
CloseHandle
FindResourceA
LoadResource
LockResource
EnterCriticalSection
LoadLibraryA
GetProcAddress
LeaveCriticalSection
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentProcessId
SetEvent
OutputDebugStringA
IsBadStringPtrA
IsBadWritePtr
GetDriveTypeA
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindNextFileA
DeleteFileA
SetFileAttributesA
FindClose
FindFirstFileA
LocalFree
lstrcmpA
LocalAlloc
GetSystemTimeAsFileTime
user32
UnregisterClassA
DestroyIcon
CharUpperW
CharUpperA
CharLowerW
CharLowerA
SetTimer
PostMessageA
GetSystemMetrics
LoadStringA
SetWindowLongA
PostThreadMessageA
GetClientRect
IsIconic
SendMessageA
DrawIcon
RegisterWindowMessageA
IsWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
LoadIconA
CharPrevA
GetDlgItemTextA
SetForegroundWindow
CloseWindow
EnableWindow
GetWindowLongA
SetActiveWindow
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyA
RegDeleteValueA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
ImageList_GetImageCount
ImageList_GetIcon
oleaut32
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE