Static task
static1
Behavioral task
behavioral1
Sample
8b419b706d60d266a09cc3e059e92bf791c8a1ab93a7f5add669607f342f9efd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b419b706d60d266a09cc3e059e92bf791c8a1ab93a7f5add669607f342f9efd.exe
Resource
win10v2004-20221111-en
General
-
Target
8b419b706d60d266a09cc3e059e92bf791c8a1ab93a7f5add669607f342f9efd
-
Size
157KB
-
MD5
cb6800fa85d9b0d2b59d13c049ef632a
-
SHA1
a2a335c474047cedd35ce9d69652c2f3d4326c23
-
SHA256
8b419b706d60d266a09cc3e059e92bf791c8a1ab93a7f5add669607f342f9efd
-
SHA512
bcf6e421fb86f6aaf199ca7c6550fe4c0ad02264872159ede0a0b8171d588893b81a6a664c208ad2fab9e29496d16921413f4cd8ebc4b7af7c24a39cc8d3f758
-
SSDEEP
3072:UCt91p0jvM6ic/wI35heUeJ1HG/JoSDkoTsCSfO5:UC/p0j/c05hedJ1HGOwTHSfO5
Malware Config
Signatures
Files
-
8b419b706d60d266a09cc3e059e92bf791c8a1ab93a7f5add669607f342f9efd.exe windows x86
e15975fcafd4710660b347c0b85f2276
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LeaveCriticalSection
GetCurrentThreadId
GetSystemDirectoryA
GetLastError
VirtualFreeEx
GetProcessHeap
GlobalLock
GetModuleHandleA
CreateWaitableTimerA
GetTempFileNameA
GetProcAddress
lstrcpyA
Sleep
GetSystemTime
user32
DestroyWindow
GetWindow
IsWindowUnicode
LoadAcceleratorsA
LoadCursorA
GetLastActivePopup
gdi32
CreateDIBPatternBrushPt
FloodFill
advapi32
AddAce
CopySid
ole32
CoUninitialize
msvfw32
DrawDibOpen
ICOpen
avifil32
AVIStreamCreate
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 12KB - Virtual size: 337KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ