Static task
static1
Behavioral task
behavioral1
Sample
8c0e6369a2ac12b9ac47b76a86f73ec66a6c5db3265ff969aeb666d3300e9191.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c0e6369a2ac12b9ac47b76a86f73ec66a6c5db3265ff969aeb666d3300e9191.exe
Resource
win10v2004-20221111-en
General
-
Target
8c0e6369a2ac12b9ac47b76a86f73ec66a6c5db3265ff969aeb666d3300e9191
-
Size
24KB
-
MD5
a2cdee25f92b37a881aca02f76f01615
-
SHA1
a06852f63e5d48c9cab3040f8cf9cba57aa8ee37
-
SHA256
8c0e6369a2ac12b9ac47b76a86f73ec66a6c5db3265ff969aeb666d3300e9191
-
SHA512
d2bd9942b517c5c1173c5d6ddf6a3b5c09abe61fd6124c45b6e4ef813d8dd1a00919572f570a81e65e02d8369a1b1ab97d2f7caf24e2576e5fd3e6e482efeb0c
-
SSDEEP
384:xu7e6t/ouENsc+9u+KinxTb+eSxSv1+B51u2HujT5BFZN9/1cHRMi:xovZEigrMkeNv1A51u2H6bFZFcf
Malware Config
Signatures
Files
-
8c0e6369a2ac12b9ac47b76a86f73ec66a6c5db3265ff969aeb666d3300e9191.exe windows x86
1c2bf0f05226af3c9f46a4623ca64025
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
InterlockedExchange
CreateThread
WaitForSingleObject
GetLastError
CreateMutexA
SetPriorityClass
GetModuleFileNameA
GetStartupInfoA
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
SetFileAttributesA
CopyFileA
ReleaseMutex
GetModuleHandleA
SetErrorMode
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
ReadFile
GetFileSize
SetFilePointer
CreateFileA
DeleteFileA
ExitProcess
CreateProcessA
GetCurrentProcess
CloseHandle
lstrcpyA
GetVersionExA
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
FreeLibrary
GetSystemDirectoryA
GlobalAlloc
GetProcAddress
GlobalFree
OutputDebugStringA
Sleep
LoadLibraryA
lstrcmpiA
user32
wsprintfA
ExitWindowsEx
advapi32
OpenSCManagerA
RegOpenKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
CloseServiceHandle
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CreateServiceA
StartServiceCtrlDispatcherA
StartServiceA
shell32
ShellExecuteA
msvcrt
_controlfp
_except_handler3
__set_app_type
rand
srand
strchr
sprintf
strncpy
strcspn
strstr
??2@YAPAXI@Z
atoi
memmove
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
ws2_32
WSAStartup
closesocket
socket
send
connect
WSASocketA
WSAIoctl
shutdown
recv
__WSAFDIsSet
select
setsockopt
htons
htonl
inet_addr
sendto
gethostbyname
WSACleanup
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
shlwapi
SHDeleteKeyA
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE