Static task
static1
Behavioral task
behavioral1
Sample
8fd07432c3e2c2d348c553e134ea4b0a00828d8057d783c2ee97d1fa22dfd859.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8fd07432c3e2c2d348c553e134ea4b0a00828d8057d783c2ee97d1fa22dfd859.exe
Resource
win10v2004-20221111-en
General
-
Target
8fd07432c3e2c2d348c553e134ea4b0a00828d8057d783c2ee97d1fa22dfd859
-
Size
3.9MB
-
MD5
65d598000b14d8fae375b34ebc6b6a88
-
SHA1
cbc495c2f158ba2b9246884f241d91ef54bead82
-
SHA256
8fd07432c3e2c2d348c553e134ea4b0a00828d8057d783c2ee97d1fa22dfd859
-
SHA512
e49660b27e61ad1dc4965daeb8531339ce012294f5d9cbc92b7eb204407e4055d43522801ab322ca9f1b9ea14fb16fd0659cbb8462a1863cc37c521dc896f686
-
SSDEEP
98304:bCiXmwWWXfsXnN67RRqFtaJ2uJsOig+K/J/UQCKee:bbXmwWWXfsXN67REwd+EUlKee
Malware Config
Signatures
Files
-
8fd07432c3e2c2d348c553e134ea4b0a00828d8057d783c2ee97d1fa22dfd859.exe windows x86
361138b9f36ccc1c090d1619c4f05c75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32Next
GetSystemDirectoryA
GetProcessHeap
GetNativeSystemInfo
GetCommandLineA
PurgeComm
GlobalMemoryStatusEx
FlushViewOfFile
OpenFileMappingA
GetFileInformationByHandle
GetTapePosition
DeleteFileA
RaiseException
ChangeTimerQueueTimer
FreeConsole
WriteConsoleInputA
WriteConsoleOutputA
HeapCreate
Heap32Next
GetConsoleOutputCP
GetConsoleTitleA
GetModuleFileNameA
GetEnvironmentStringsA
ResetEvent
SetProcessShutdownParameters
GlobalWire
DeleteTimerQueueEx
SetConsoleCursorMode
SetConsoleMenuClose
GetExitCodeProcess
GetProcessShutdownParameters
Sleep
GetExitCodeThread
GetProcessWorkingSetSize
SetTapeParameters
GetDllDirectoryA
GetDiskFreeSpaceExA
GetFileInformationByHandle
GetCurrentDirectoryA
SetMessageWaitingIndicator
LocalReAlloc
FatalExit
ReadConsoleA
GetThreadIOPendingFlag
WriteProfileSectionA
SetEvent
IsBadStringPtrA
OpenEventA
GetCommandLineA
TermsrvAppInstallMode
GetThreadContext
PulseEvent
LoadLibraryExW
SetCurrentDirectoryA
GetProcAddress
IsSystemResumeAutomatic
ReadConsoleInputA
GetFileAttributesExA
_lclose
GetAtomNameA
QueryInformationJobObject
GetDefaultCommConfigA
IsProcessorFeaturePresent
_lopen
GetTempPathA
ExitProcess
ExpungeConsoleCommandHistoryA
GetLogicalDriveStringsA
GetFileAttributesExA
SetFirmwareEnvironmentVariableA
WriteConsoleOutputCharacterA
OpenJobObjectA
SetUnhandledExceptionFilter
TransactNamedPipe
RemoveDirectoryA
GetProcessPriorityBoost
SystemTimeToFileTime
BeginUpdateResourceA
GetProcessWorkingSetSize
GetWindowsDirectoryA
GetProcessPriorityBoost
LocalFileTimeToFileTime
FindAtomA
DisconnectNamedPipe
TerminateThread
MapViewOfFile
GetProcessHeaps
ReadConsoleOutputCharacterA
DeleteTimerQueueEx
SetEnvironmentVariableA
SetProcessPriorityBoost
GetSystemTimes
CopyFileExA
SetFileAttributesA
SetVolumeLabelA
OpenJobObjectA
GetUserGeoID
FlushConsoleInputBuffer
GetNumberFormatA
HeapDestroy
GetStdHandle
HeapWalk
GetLogicalDriveStringsA
GetStartupInfoA
LocalUnlock
GetFileTime
IsBadReadPtr
LZClose
WriteConsoleOutputCharacterA
GetProcessShutdownParameters
SetEvent
ExitVDM
GetLocaleInfoA
UnregisterConsoleIME
OpenMutexA
GetCurrentConsoleFont
GetCalendarInfoA
GetProcessHeaps
SetLastConsoleEventActive
ProcessIdToSessionId
GlobalAddAtomA
GetModuleHandleA
ClearCommError
LoadLibraryExW
GetProcessVersion
GetEnvironmentVariableA
CreateDirectoryExA
CancelWaitableTimer
GetFileAttributesExA
ReadConsoleOutputA
EnumTimeFormatsA
DeleteTimerQueue
WriteConsoleOutputAttribute
GetUserDefaultLCID
SetFilePointer
GetFileAttributesExA
CancelWaitableTimer
GetPriorityClass
GetConsoleCursorInfo
GetFileType
GetTempPathA
GetBinaryTypeA
GlobalUnlock
HeapFree
GetLongPathNameA
HeapSize
OpenFileMappingA
SetInformationJobObject
GetLogicalDrives
ReadConsoleOutputCharacterA
GetDiskFreeSpaceA
GetCommModemStatus
FlushConsoleInputBuffer
DuplicateConsoleHandle
GetSystemInfo
BuildCommDCBA
GetCommTimeouts
WriteProcessMemory
OpenWaitableTimerA
GetFullPathNameA
FlushFileBuffers
GlobalSize
GetConsoleMode
FindVolumeClose
Module32Next
SetPriorityClass
OpenWaitableTimerA
MoveFileA
GetConsoleTitleA
SetEvent
DeleteTimerQueueEx
RemoveDirectoryA
EnumSystemLocalesA
HeapAlloc
VerifyVersionInfoA
Process32Next
GetFileInformationByHandle
VirtualProtectEx
LocalCompact
WriteConsoleOutputCharacterW
DeleteTimerQueueEx
ResetWriteWatch
GetStringTypeExA
GetDefaultCommConfigA
SetupComm
GetConsoleCursorInfo
Process32First
WaitForSingleObject
FillConsoleOutputCharacterA
GetCurrentConsoleFont
FindNextVolumeMountPointW
FormatMessageA
EnumUILanguagesA
lstrcpy
SetInformationJobObject
LocalSize
WritePrivateProfileStringA
GetVDMCurrentDirectories
UnlockFileEx
VirtualAlloc
GetCPInfoExA
GetThreadPriority
ReleaseMutex
GetCompressedFileSizeA
GetDiskFreeSpaceA
user32
CallMsgFilter
SetShellWindow
CharLowerBuffA
DialogBoxParamA
CheckDlgButton
IsCharAlphaNumericA
DrawTextExW
DefRawInputProc
IsMenu
DisableProcessWindowsGhosting
MessageBoxTimeoutA
DefRawInputProc
GetUpdateRect
GetMouseMovePointsEx
EnumDisplaySettingsExA
GetReasonTitleFromReasonCode
DefFrameProcA
SendIMEMessageExA
SetForegroundWindow
DrawFocusRect
GetRawInputDeviceInfoA
FindWindowExA
EnumChildWindows
WaitForInputIdle
LoadAcceleratorsA
GetMessagePos
CascadeWindows
UnionRect
GetWindowInfo
FlashWindow
GetUserObjectInformationA
SetSysColorsTemp
SwitchToThisWindow
IsRectEmpty
UnpackDDElParam
CheckRadioButton
SetWindowPlacement
AttachThreadInput
MenuWindowProcA
CreateIconIndirect
IsWindowEnabled
GetKeyboardLayoutNameA
GetKBCodePage
GetKeyboardLayoutList
LoadMenuIndirectA
GetProcessWindowStation
LoadStringA
GetClipCursor
InvalidateRect
GetClientRect
ScrollWindowEx
EnumChildWindows
OemKeyScan
GetKeyState
EnumDesktopWindows
DlgDirSelectExA
GetInternalWindowPos
GetRawInputData
DialogBoxIndirectParamA
SendIMEMessageExA
SetWindowLongA
CharPrevExA
DrawMenuBar
GetParent
IsHungAppWindow
GetDialogBaseUnits
GetMenuContextHelpId
ScreenToClient
MenuWindowProcA
CharPrevExA
DeregisterShellHookWindow
GetKeyNameTextA
SetDlgItemInt
SetProgmanWindow
GetProgmanWindow
ActivateKeyboardLayout
SetCursorPos
DrawCaption
GetMenuCheckMarkDimensions
GetMessageA
SendMessageCallbackA
SetLayeredWindowAttributes
DragDetect
GetMenuCheckMarkDimensions
PrivateExtractIconsA
EndMenu
CreateWindowStationA
SetProcessDefaultLayout
DlgDirSelectExA
CopyAcceleratorTableA
IsClipboardFormatAvailable
CallMsgFilter
RegisterClassExW
PrintWindow
SendIMEMessageExA
GetDialogBaseUnits
GetWindowModuleFileNameA
RegisterMessagePumpHook
GetMenuItemID
GetAltTabInfo
DeregisterShellHookWindow
GetRawInputDeviceList
GetClipboardViewer
PeekMessageA
GetMessageExtraInfo
DlgDirListA
SetProcessWindowStation
SetMenuInfo
ToUnicodeEx
SetTaskmanWindow
IsClipboardFormatAvailable
GetDlgItem
FillRect
GetScrollBarInfo
ReasonCodeNeedsComment
GetFocus
ShowOwnedPopups
MapDialogRect
GetRawInputDeviceList
GetScrollPos
DialogBoxIndirectParamA
RegisterClipboardFormatA
IsMenu
TranslateMessageEx
GetAltTabInfoA
EnterReaderModeHelper
DrawTextExW
GetSystemMetrics
GetNextDlgGroupItem
DrawFrameControl
ToAsciiEx
ScrollDC
CloseWindowStation
PostThreadMessageA
GetSubMenu
GetClipboardFormatNameA
GetWindowThreadProcessId
CharUpperA
QuerySendMessage
AnyPopup
SendInput
ExitWindowsEx
BeginPaint
IsCharAlphaNumericW
FillRect
GetScrollRange
DefDlgProcA
GetMenuStringA
SetScrollPos
SetMenuItemInfoA
DrawTextExA
GetCaretPos
EnumChildWindows
SetWindowLongA
GetMenuItemInfoA
CreateIconFromResourceEx
LoadMenuIndirectA
DisplayExitWindowsWarnings
GetRawInputData
GetMessageA
PrivateExtractIconsA
DrawTextExA
FindWindowExW
DrawMenuBar
RegisterClipboardFormatA
SetCapture
FindWindowExW
GetInputState
GetSysColor
ShowScrollBar
DeferWindowPos
GetProcessDefaultLayout
DefWindowProcA
SetWindowsHookExW
MenuWindowProcA
ToAscii
MenuWindowProcA
ShowScrollBar
RemovePropA
CreateWindowStationW
GetMonitorInfoA
IsDialogMessageA
SetClassWord
LoadCursorFromFileA
DrawFocusRect
SetWindowLongA
IsServerSideWindow
IsDialogMessageA
UnhookWindowsHookEx
GetAsyncKeyState
GetPropA
SetShellWindow
GetIconInfo
SetClassLongA
BroadcastSystemMessageExA
ScrollWindow
EnumDesktopsA
OpenIcon
GetKeyboardLayoutNameA
SwitchDesktop
CopyIcon
SubtractRect
tapi32
lineAccept
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.9MB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ