Static task
static1
Behavioral task
behavioral1
Sample
8f4997a1defeb2d6a56c5b22b8ddede5f601416cfd7efff0d8dba6323d49ae42.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f4997a1defeb2d6a56c5b22b8ddede5f601416cfd7efff0d8dba6323d49ae42.exe
Resource
win10v2004-20221111-en
General
-
Target
8f4997a1defeb2d6a56c5b22b8ddede5f601416cfd7efff0d8dba6323d49ae42
-
Size
769KB
-
MD5
ef8c5f806d57185fecbefcbfc53eda8d
-
SHA1
30a02b283fb3492eefe99f9c80bcc7712ca1e60f
-
SHA256
8f4997a1defeb2d6a56c5b22b8ddede5f601416cfd7efff0d8dba6323d49ae42
-
SHA512
2db737d239e5988fd56d936293474c9cec1b0c7215d6beac5fbfdb2ceefcf14aca6cef74751ef4b3ba9eaa91f949edbaa2cc14b51faed122b101bba996ea37ea
-
SSDEEP
24576:DAqsZiBTGeeJ23aYMDQ+peAyrRWy/HdH:UqsZiFMo3aYMDQcTy9//9
Malware Config
Signatures
Files
-
8f4997a1defeb2d6a56c5b22b8ddede5f601416cfd7efff0d8dba6323d49ae42.exe windows x86
fbbd8a30b2acdd7b7659aa94edeb12e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetStartupInfoA
GetProcessHeap
Sleep
CreateHardLinkW
GetStdHandle
GetTickCount
GetFileAttributesA
GetLocalTime
HeapSize
DeleteFileW
ReadConsoleW
GetPriorityClass
GlobalFree
CreateMutexW
CreateSemaphoreA
LoadLibraryA
SetLastError
VirtualProtect
SetLastError
SetEvent
wintrust
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
traffic
TcDeleteFlow
TcAddFlow
TcAddFilter
TcDeleteFilter
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 761KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE