Static task
static1
Behavioral task
behavioral1
Sample
f8d242610aa567ebf1d4cd82272b44910069751efa4dd09aee8b68a021dfae0e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8d242610aa567ebf1d4cd82272b44910069751efa4dd09aee8b68a021dfae0e.exe
Resource
win10v2004-20221111-en
General
-
Target
f8d242610aa567ebf1d4cd82272b44910069751efa4dd09aee8b68a021dfae0e
-
Size
176KB
-
MD5
388a7431e9b43819aa1979983a37e989
-
SHA1
b628aa82c7f6484382af4e0c815b5774e695bdb6
-
SHA256
f8d242610aa567ebf1d4cd82272b44910069751efa4dd09aee8b68a021dfae0e
-
SHA512
ad9af29f98138eb7ee3dd9f021ba8e62c6879119d64f629e345d63fc932009a2e2fae94d68983c0418742bfa7c2867743143a0f306adce0a80a8111fb8915f39
-
SSDEEP
3072:22qPgQUbG9nCfmM7Mb6QtufMr1yJp53q8K1Qms5Yu:22qPgXbwnhMoaf2UXdq8K16iu
Malware Config
Signatures
Files
-
f8d242610aa567ebf1d4cd82272b44910069751efa4dd09aee8b68a021dfae0e.exe windows x86
66825f9032f1f4ab6f8d7dea68a03250
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
OpenProcess
GetModuleHandleW
GetModuleFileNameW
ReadFile
SetEndOfFile
VirtualFreeEx
SetFilePointer
CreateFileW
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
CloseHandle
GetPrivateProfileSectionNamesW
GetPrivateProfileIntW
GetPrivateProfileStringW
WritePrivateProfileStringW
WriteProcessMemory
ReadProcessMemory
LCMapStringW
LCMapStringA
HeapSize
FlushFileBuffers
LoadLibraryA
InitializeCriticalSection
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetConsoleCP
ReadConsoleInputA
GetLastError
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
Sleep
GetProcAddress
GetModuleHandleA
ExitProcess
CreateFileA
WriteConsoleA
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
OffsetRect
PtInRect
LoadStringW
LoadCursorW
FindWindowExW
LockWindowUpdate
GetWindowThreadProcessId
EnumDisplayMonitors
SystemParametersInfoW
SetCursor
GetMonitorInfoW
SendMessageW
SetRect
MessageBeep
GetSystemMetrics
EnumWindows
advapi32
RegSetValueExW
RegQueryValueExW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
RegCreateKeyExW
shell32
SHGetDesktopFolder
ole32
CoInitialize
CoTaskMemFree
shlwapi
SHDeleteKeyW
PathIsRelativeW
StrRetToStrW
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ