Static task
static1
Behavioral task
behavioral1
Sample
8e48bdde5f37d05f10081e38413e8974d7521b27d5e8332fbd3f193fa52c3113.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e48bdde5f37d05f10081e38413e8974d7521b27d5e8332fbd3f193fa52c3113.exe
Resource
win10v2004-20220812-en
General
-
Target
8e48bdde5f37d05f10081e38413e8974d7521b27d5e8332fbd3f193fa52c3113
-
Size
351KB
-
MD5
e7292642096273d56ab9ec19258c24cd
-
SHA1
dd105925621918a161cfbb57b0397e437f3aeb2c
-
SHA256
8e48bdde5f37d05f10081e38413e8974d7521b27d5e8332fbd3f193fa52c3113
-
SHA512
b3c8768a12b07af5689acc972fca9552298b98fd763c5a86bcbb5b83c985fdf6a26cf8c69a09b044d7c95b7b69f470032b85a35b78213c5e532ec9d732dd2d06
-
SSDEEP
6144:SPF2v4TE+oSsRYHODOdod5ONYeJXMshB+1s+ziGViVN7VM+:CQB+IRYHOLIPJcshB+1VFIfVM+
Malware Config
Signatures
Files
-
8e48bdde5f37d05f10081e38413e8974d7521b27d5e8332fbd3f193fa52c3113.exe windows x86
7bd07d399cb7ec9924a42cdbde340d81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSettings
ShellExecuteA
gdi32
CreateBitmapIndirect
CreateICW
kernel32
GetConsoleCursorInfo
GetCompressedFileSizeW
GetDiskFreeSpaceExA
OpenMutexA
GetNumberFormatW
GetDateFormatA
FormatMessageW
SetCommMask
GetTapeStatus
LocalReAlloc
UnhandledExceptionFilter
GetSystemTimeAsFileTime
_lclose
SetProcessAffinityMask
ClearCommBreak
SizeofResource
GetShortPathNameA
DosDateTimeToFileTime
FindFirstFileA
CreateNamedPipeW
SetCommTimeouts
SetThreadLocale
GetFileAttributesExA
CancelIo
MoveFileExA
GetStartupInfoA
IsDBCSLeadByteEx
EraseTape
OpenSemaphoreW
InitializeCriticalSection
GlobalAddAtomW
GetProfileStringA
SetCurrentDirectoryA
GlobalDeleteAtom
ReadConsoleA
GetOEMCP
GetCurrentProcess
ReadConsoleOutputA
MoveFileW
GetThreadContext
SetEndOfFile
CreateDirectoryExA
GetThreadPriority
FindNextChangeNotification
lstrcmpiW
AllocConsole
GetHandleInformation
FreeLibrary
CreateEventA
PeekNamedPipe
lstrcpyA
RemoveDirectoryW
ExitProcess
WritePrivateProfileStructA
GlobalFree
SetProcessShutdownParameters
SetNamedPipeHandleState
IsProcessorFeaturePresent
advapi32
OpenSCManagerA
LogonUserA
RegConnectRegistryA
CryptImportKey
GetTokenInformation
GetSidIdentifierAuthority
CloseEventLog
RegGetKeySecurity
GetNamedSecurityInfoW
StartServiceA
oleaut32
VariantChangeType
SysStringLen
SafeArrayGetLBound
user32
LoadCursorFromFileW
CharUpperBuffW
EmptyClipboard
NotifyWinEvent
CopyRect
DestroyCaret
ArrangeIconicWindows
MenuItemFromPoint
GetMonitorInfoA
GetMenuItemID
GetGuiResources
GetMenuStringA
GrayStringA
msvcrt
wctomb
strtoul
wcsspn
strftime
_wmakepath
sscanf
_getcwd
_iob
_flushall
__p___argv
_open_osfhandle
wcscpy
_wspawnv
isleadbyte
fclose
_strnicoll
_i64tow
_mbscmp
_wspawnvp
free
rand
_fsopen
_ltow
_cexit
_ismbcdigit
Sections
.text Size: 14KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE