Static task
static1
Behavioral task
behavioral1
Sample
8108aebc7430264aeb0304da66d2e8b6345333b63d914ef562a48fd24e46bd08.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8108aebc7430264aeb0304da66d2e8b6345333b63d914ef562a48fd24e46bd08.exe
Resource
win10v2004-20221111-en
General
-
Target
8108aebc7430264aeb0304da66d2e8b6345333b63d914ef562a48fd24e46bd08
-
Size
229KB
-
MD5
82d4b01f023dbc4e00f6fe3167980378
-
SHA1
4965aa7e90013769102a0692f34ad795038d9f03
-
SHA256
8108aebc7430264aeb0304da66d2e8b6345333b63d914ef562a48fd24e46bd08
-
SHA512
411046d540d2075a2c1325c0e13766776aa47fc5c41159156eaa4c0fd314b216b817eabb8ec7efadad59fe7ac8023027702a57311b1c90cd89138c55130ea9fa
-
SSDEEP
1536:IPXNwW1TtR0pc+YYcDRGEFOooJTbypkppFl:eiYJR0pcycvF43IkbF
Malware Config
Signatures
Files
-
8108aebc7430264aeb0304da66d2e8b6345333b63d914ef562a48fd24e46bd08.exe windows x86
0ca068ee4534d0b56ba0a9154d58b7d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetHandleInformation
ConnectNamedPipe
Thread32Next
GlobalFlags
IsBadWritePtr
GlobalAlloc
CreatePipe
WritePrivateProfileSectionA
GetCommMask
EnumTimeFormatsW
EnumDateFormatsA
GetPrivateProfileSectionA
IsBadStringPtrW
EnumTimeFormatsW
GlobalFindAtomA
GetProcessHeaps
SetNamedPipeHandleState
CreateHardLinkW
GlobalFlags
GetProfileIntA
GlobalAddAtomA
EnumTimeFormatsW
SetHandleInformation
SetConsoleCursor
IsBadStringPtrA
ReadConsoleOutputW
CreateHardLinkW
IsBadHugeWritePtr
FindCloseChangeNotification
GlobalAddAtomA
SetConsoleActiveScreenBuffer
GetBinaryTypeA
GetProcessAffinityMask
Process32First
CreateDirectoryExA
ClearCommBreak
SetHandleInformation
EnumTimeFormatsW
GetCommTimeouts
ExpandEnvironmentStringsA
CreateHardLinkW
FindNextFileW
ExpandEnvironmentStringsA
PeekConsoleInputA
Heap32ListFirst
Process32First
user32
SetScrollRange
FindWindowExW
GetWindowRgn
CreateDialogParamA
CreateWindowExA
SetScrollInfo
GetMenuItemCount
FindWindowExA
FindWindowExW
ShowScrollBar
ActivateKeyboardLayout
WINNLSEnableIME
FindWindowA
RemovePropW
SetWindowsHookW
UnhookWindowsHookEx
DdeCmpStringHandles
MonitorFromPoint
GetTopWindow
SetWindowTextA
CreateWindowExA
HiliteMenuItem
GetCursor
DdeCmpStringHandles
ArrangeIconicWindows
EnumDesktopWindows
SetActiveWindow
DdeConnect
TileChildWindows
Sections
.text Size: 212KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tabl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tabl Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.tabl Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE