Static task
static1
Behavioral task
behavioral1
Sample
8adbc45e06b239f334708c45f92220aabf4f1462fe03f30c367266e161ff0ad6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8adbc45e06b239f334708c45f92220aabf4f1462fe03f30c367266e161ff0ad6.exe
Resource
win10v2004-20221111-en
General
-
Target
8adbc45e06b239f334708c45f92220aabf4f1462fe03f30c367266e161ff0ad6
-
Size
112KB
-
MD5
38fd7dbd1d4dd813fbfe212d43fe9a53
-
SHA1
9591ea1516dd2c18826c53af33f270b308e6a719
-
SHA256
8adbc45e06b239f334708c45f92220aabf4f1462fe03f30c367266e161ff0ad6
-
SHA512
418c9b69e280e87b0c13a0155cdf7054e7d2bc86dfd918b3ffb525d4c309e2f0607f36a5e79c8f7fc3bc15aa5371c91abaf768f9e9e38e3526ac7d7617895ce3
-
SSDEEP
1536:EtgD94TFAIkLdjUdhFlzwEloR/hJmRlmKqYky03rnigoBPVeXSsiyFjBaArqTmF7:vuFiJGh8hmR87iz/KzaArzFELEd
Malware Config
Signatures
Files
-
8adbc45e06b239f334708c45f92220aabf4f1462fe03f30c367266e161ff0ad6.exe windows x86
092e50c82a68fe1bb9c6d85744f14b40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strcmp
sprintf
strcpy
strlen
rand
wcslen
_wcsicmp
memcpy
_strnicmp
printf
strrchr
strcat
strstr
memset
kernel32
GetProcessHeap
GetStartupInfoA
LoadLibraryA
lstrcmpiA
FreeLibrary
VirtualAllocEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
LocalAlloc
GetVolumeInformationA
CopyFileA
WinExec
GetLocalTime
MultiByteToWideChar
GetSystemDirectoryA
GetFileSize
CreateFileMappingA
MapViewOfFile
ReadProcessMemory
UnmapViewOfFile
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
Sleep
CloseHandle
WriteFile
CreateFileA
GetLastError
CreateThread
HeapFree
HeapAlloc
OpenProcess
WideCharToMultiByte
TerminateThread
WaitForSingleObject
GetCurrentProcessId
lstrlenA
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
VirtualProtect
user32
CharUpperA
advapi32
QueryServiceConfigA
ChangeServiceConfigA
CreateServiceA
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
netapi32
NetScheduleJobAdd
ntdll
NtQueryInformationFile
NtQuerySystemInformation
Sections
.text Size: - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bad0 Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.bad1 Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE