Static task
static1
Behavioral task
behavioral1
Sample
8e5c1743b293dc99bfcc7fc4db42244dea733f313922b662b7a2a18013d8977d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e5c1743b293dc99bfcc7fc4db42244dea733f313922b662b7a2a18013d8977d.exe
Resource
win10v2004-20220812-en
General
-
Target
8e5c1743b293dc99bfcc7fc4db42244dea733f313922b662b7a2a18013d8977d
-
Size
162KB
-
MD5
21b951105fabee3d1797c5353e1b0941
-
SHA1
24e0b5e08bbaf6c2941f5bdf49f486da970d6b17
-
SHA256
8e5c1743b293dc99bfcc7fc4db42244dea733f313922b662b7a2a18013d8977d
-
SHA512
7b25d389fdb1b00803782e229878a45137f7680699c8ca4627dd93c1cb41b6f59d4cde812c29cf7287dd1e65cfeadf627c5cda595feaa48581b99719b733afb4
-
SSDEEP
768:sETJ0nOIbnhteqbiM922SY/L2fKcZu8N8vRi0RQLjVpU62B/mOMRYziyvuWgjmy0:tJ0OITZD/L2y0u8WRivjqm0imjvpXX
Malware Config
Signatures
Files
-
8e5c1743b293dc99bfcc7fc4db42244dea733f313922b662b7a2a18013d8977d.exe windows x86
87434dbcc79e0b1a424666089212920e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
ReadFile
WriteFile
InterlockedIncrement
QueryPerformanceCounter
LocalFree
GetSystemTimeAsFileTime
InterlockedDecrement
GetSystemTimeAsFileTime
GetModuleHandleA
GetProcessHeap
InitializeCriticalSection
CreateThread
CreateThread
SetFilePointer
FreeLibrary
VirtualFree
InitializeCriticalSection
FreeLibrary
GetModuleHandleW
GetStartupInfoW
VirtualAlloc
LoadLibraryA
SetLastError
lstrcpyW
GetProcessHeap
GetCommandLineW
GetModuleHandleA
SetEvent
FreeLibrary
VirtualFree
WriteFile
GetModuleHandleA
LocalFree
GetStartupInfoW
InterlockedDecrement
QueryPerformanceCounter
CreateThread
UnhandledExceptionFilter
ReadFile
LoadLibraryW
GetCurrentThreadId
Sleep
VirtualFree
ReadFile
QueryPerformanceCounter
WriteFile
HeapReAlloc
GetCurrentProcessId
GetCommandLineW
GetStartupInfoW
SetLastError
FormatMessageW
CloseHandle
CreateThread
VirtualFree
MultiByteToWideChar
CloseHandle
GetSystemTimeAsFileTime
HeapReAlloc
TerminateProcess
FormatMessageW
InterlockedDecrement
WriteFile
GetStartupInfoA
VirtualFree
GetLastError
EnterCriticalSection
HeapDestroy
GetModuleHandleA
SetLastError
lstrcpyW
GetStartupInfoW
GetVersionExA
user32
MessageBoxW
GetWindowRect
EnableMenuItem
RegisterClassExW
LoadImageW
GetSysColor
GetDlgItemTextW
MessageBoxW
LoadStringA
SetRect
MapWindowPoints
GetDC
wsprintfA
SetFocus
GetWindowTextW
GetMenu
GetMessageW
RegisterClassW
GetDC
MessageBoxA
GetWindowTextW
GetParent
IsDlgButtonChecked
MapWindowPoints
CheckDlgButton
RegisterClassW
GetWindowTextW
EnableWindow
DestroyWindow
RegisterClassExW
SetWindowTextW
LoadMenuW
DrawTextW
ShowWindow
MessageBeep
Sections
Size: 143KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE