Static task
static1
Behavioral task
behavioral1
Sample
8edb7f5305c0248c8aa4b9ee61052ef9330d6ec1296dc56d4af187b7c4b236c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8edb7f5305c0248c8aa4b9ee61052ef9330d6ec1296dc56d4af187b7c4b236c1.exe
Resource
win10v2004-20221111-en
General
-
Target
8edb7f5305c0248c8aa4b9ee61052ef9330d6ec1296dc56d4af187b7c4b236c1
-
Size
197KB
-
MD5
fa567df67e990d631ae895fb820cb509
-
SHA1
26e2fef99251f170ba893ebb9e780ce2e16e2f93
-
SHA256
8edb7f5305c0248c8aa4b9ee61052ef9330d6ec1296dc56d4af187b7c4b236c1
-
SHA512
960ed00e07734a8db4665fca5a27afe4a272b5722f2d453dec37a53c2ddb8b8cf8458c58b9b41f187d4df8c65160f523ce072389e6970f7d14295cd77bf90e95
-
SSDEEP
3072:L5PeceIW0V1WUYYR4ebSv24JSClUh0CKlB8NtWkrq/0pmixqh9OGIwdUZVexlPkS:V20V1Yq45v2RAB8NsBzOG+Sl01rLp5i
Malware Config
Signatures
Files
-
8edb7f5305c0248c8aa4b9ee61052ef9330d6ec1296dc56d4af187b7c4b236c1.exe windows x86
902ad044fe381949c0d08aba287b2b0b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
EqualSid
FreeSid
LookupPrivilegeValueA
OpenServiceA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
SetSecurityDescriptorDacl
UnlockServiceDatabase
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileMappingA
CreateProcessA
DisableThreadLibraryCalls
ExitProcess
ExpandEnvironmentStringsA
FormatMessageA
FreeLibrary
GetCPInfo
GetConsoleCP
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemTimeAsFileTime
GetThreadLocale
GetTimeFormatA
GetUserDefaultLCID
GetVersionExA
GlobalAlloc
GlobalHandle
GlobalLock
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsValidCodePage
LoadLibraryA
LocalAlloc
LocalFree
Module32Next
MultiByteToWideChar
OpenEventA
OutputDebugStringA
QueryPerformanceCounter
ReadProcessMemory
ResetEvent
SetCurrentDirectoryA
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetStdHandle
SetThreadPriority
TerminateProcess
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
lstrcmpiA
lstrlenA
user32
CharNextA
DispatchMessageA
EndDialog
GetCursorPos
GetDC
GetDlgItemTextA
GetFocus
GetKeyState
GetMessageA
GetMessagePos
GetParent
GetProcessWindowStation
GetSystemMenu
GetWindowLongA
GetWindowThreadProcessId
InflateRect
IsWindowVisible
MessageBoxA
MoveWindow
PostQuitMessage
RegisterClassExA
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetWindowLongA
ShowWindow
SystemParametersInfoA
TranslateMessage
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 136KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ