Static task
static1
Behavioral task
behavioral1
Sample
8a6c4db478dd791253e14df2e55b729b4fae9fe90de1cbbd7ffc45061b64608d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a6c4db478dd791253e14df2e55b729b4fae9fe90de1cbbd7ffc45061b64608d.exe
Resource
win10v2004-20220812-en
General
-
Target
8a6c4db478dd791253e14df2e55b729b4fae9fe90de1cbbd7ffc45061b64608d
-
Size
704KB
-
MD5
0881771005c659dfcf91f8c6308d19e0
-
SHA1
5a9467462962315db7e3e68f39a03559147792c0
-
SHA256
8a6c4db478dd791253e14df2e55b729b4fae9fe90de1cbbd7ffc45061b64608d
-
SHA512
1bcfc29e12a334d36a68fc7050122a5c4c0a54373ccab146c640da8e5bca53da0c02eeb425a7c3729c6257a203aa58998482374ba8f72667b17b8ccccd2d6de6
-
SSDEEP
12288:a0J15AzsRK2d5wui7yS1SCIq88VMuPyz42+eJvm7eU8pY475opHZ:aVsg6i7yS1oEMkyMSgeU8HSpHZ
Malware Config
Signatures
Files
-
8a6c4db478dd791253e14df2e55b729b4fae9fe90de1cbbd7ffc45061b64608d.exe windows x86
53e715e244d42e2e9f7a08aa68ef0929
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapVirtualKeyW
RegisterClassW
RegisterClassExW
gdi32
CreateDCA
Polygon
SetBkMode
CreateEnhMetaFileA
CreateEllipticRgn
CreateSolidBrush
LineTo
SetWindowOrgEx
PolyBezier
ExtTextOutA
SelectClipRgn
TextOutA
GetFontData
SetPixel
StrokePath
CopyMetaFileA
GetTextColor
CreatePolygonRgn
SetTextColor
GetPixel
CloseMetaFile
ScaleWindowExtEx
CreatePatternBrush
GetNearestPaletteIndex
GetWindowOrgEx
EnumFontFamiliesExA
GetViewportOrgEx
ExtFloodFill
SetBrushOrgEx
RestoreDC
GetObjectType
ScaleViewportExtEx
SetTextAlign
PlayEnhMetaFile
CreateFontA
SelectClipPath
GetWindowExtEx
SetPolyFillMode
SelectPalette
ExtSelectClipRgn
EndPath
Rectangle
GetOutlineTextMetricsA
CombineRgn
CreateMetaFileA
GetTextAlign
CloseEnhMetaFile
GetROP2
GetDeviceCaps
FrameRgn
BeginPath
DPtoLP
StretchDIBits
CreateRectRgn
DeleteDC
StretchBlt
GetTextFaceA
GetTextExtentPoint32A
CreateRectRgnIndirect
GetBkMode
SaveDC
GetObjectA
CreateCompatibleDC
SetPaletteEntries
Polyline
GetBkColor
CreatePalette
PatBlt
ExtCreatePen
SetTextCharacterExtra
GetCurrentPositionEx
ExcludeClipRect
DeleteObject
shell32
SHGetPathFromIDListA
ExtractIconA
DragAcceptFiles
ShellExecuteA
DragFinish
mfc42
ord1576
comctl32
ImageList_Remove
CreatePropertySheetPageA
ImageList_GetImageInfo
ImageList_Draw
DestroyPropertySheetPage
ImageList_AddMasked
ord17
ImageList_EndDrag
ImageList_Add
ImageList_DrawEx
ImageList_Create
ImageList_LoadImageA
ImageList_DragMove
_TrackMouseEvent
ImageList_GetImageCount
ImageList_ReplaceIcon
ImageList_GetIconSize
ImageList_Destroy
ImageList_GetIcon
InitCommonControlsEx
kernel32
GetVersionExW
RtlUnwind
GetFileSize
WriteConsoleA
CompareStringW
WideCharToMultiByte
GetCurrentThreadId
GetModuleFileNameW
GetCommandLineA
GetLocaleInfoA
CreateDirectoryW
GetModuleHandleA
DeleteCriticalSection
CloseHandle
RaiseException
TlsSetValue
VirtualFree
MultiByteToWideChar
HeapAlloc
GetOEMCP
WriteConsoleW
FreeEnvironmentStringsA
GetCPInfo
GetLocaleInfoW
GetLastError
FindFirstFileW
SetEnvironmentVariableA
HeapReAlloc
GetConsoleOutputCP
FindClose
GetACP
GetModuleHandleW
FreeLibrary
CreateFileA
GetStringTypeA
CreateFileW
CreateProcessW
VirtualQuery
InitializeCriticalSection
LCMapStringW
SetEndOfFile
InterlockedIncrement
GetConsoleMode
TlsAlloc
TlsGetValue
GlobalUnlock
GetEnvironmentStrings
EnterCriticalSection
WriteFile
TerminateProcess
FindNextFileW
SetStdHandle
DeleteFileW
GetUserDefaultLCID
InterlockedDecrement
CreateMutexW
TlsFree
OpenMutexW
HeapFree
GlobalFree
GetModuleFileNameA
FatalAppExitA
Sleep
QueryPerformanceCounter
GetConsoleCP
SetLastError
GetFileType
IsValidLocale
GetCurrentProcessId
LoadLibraryA
GetProcAddress
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetStartupInfoA
SetHandleCount
HeapDestroy
FreeEnvironmentStringsW
IsValidCodePage
LeaveCriticalSection
GetStdHandle
GetVersionExA
GetTimeZoneInformation
HeapSize
SetFilePointer
GetFullPathNameW
GetCurrentThread
FlushFileBuffers
ReadFile
InterlockedExchange
GetStartupInfoW
GlobalAlloc
GetCurrentProcess
GetCommandLineW
LCMapStringA
VirtualAlloc
GetStringTypeW
GetTimeFormatA
SetUnhandledExceptionFilter
WaitForSingleObject
GetDateFormatA
GlobalLock
GetProcessHeap
OutputDebugStringW
HeapCreate
GetTickCount
ExitProcess
IsDebuggerPresent
CompareStringA
UnhandledExceptionFilter
oleaut32
LoadTypeLi
advapi32
OpenSCManagerA
OpenThreadToken
RegCloseKey
ControlService
CloseServiceHandle
GetUserNameA
RegDeleteValueA
RegSetValueExA
RegEnumValueA
InitializeSecurityDescriptor
RegCreateKeyA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
QueryServiceStatus
DeleteService
AllocateAndInitializeSid
RegDeleteKeyA
RegQueryValueA
RegEnumKeyA
OpenProcessToken
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 452KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ