Static task
static1
Behavioral task
behavioral1
Sample
a8c8211a4c55242083d76479792d359ac54273795509df236d7fc68ce1ba3708.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8c8211a4c55242083d76479792d359ac54273795509df236d7fc68ce1ba3708.exe
Resource
win10v2004-20220812-en
General
-
Target
a8c8211a4c55242083d76479792d359ac54273795509df236d7fc68ce1ba3708
-
Size
18KB
-
MD5
8fcfd44efe5e9e851f3a7bbcbdeadcb3
-
SHA1
373cd660e83fe33d2b34b3690e4845e31d3e1713
-
SHA256
a8c8211a4c55242083d76479792d359ac54273795509df236d7fc68ce1ba3708
-
SHA512
dcc83fcf75a59e370b0596e32d9092106a64b51f51d60aff523138f9b8bf862938f5aa8b8df23cf4708a332086b4517a419df37597cf38799ac1d3c2a469fb1c
-
SSDEEP
384:wZKJHHuOfczTNZJAuIJR0WN7yuJqEbYOnyED+4e9m91cZ8:/Ff6TvUNN7yuUwYOya+hSK8
Malware Config
Signatures
Files
-
a8c8211a4c55242083d76479792d359ac54273795509df236d7fc68ce1ba3708.exe windows x86
b921fd709f821fe643c2373c6d25733d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strcmp
memmove
strlen
strcpy
strcat
memcpy
strncpy
localtime
mktime
gmtime
kernel32
GetModuleHandleA
HeapCreate
GetSystemDirectoryA
GetDriveTypeA
BeginUpdateResourceA
EndUpdateResourceA
GetCommandLineA
HeapDestroy
ExitProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
CloseHandle
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
CreateSemaphoreA
ReleaseSemaphore
GetVersionExA
LoadLibraryA
GetProcAddress
DeleteCriticalSection
CreateThread
GetCurrentThreadId
Sleep
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
HeapAlloc
HeapFree
FindFirstFileA
FindClose
GetFileAttributesA
SetFileAttributesA
CopyFileA
GetLastError
FindNextFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetLocalTime
WriteFile
ReadFile
GetFileSize
SetFilePointer
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
WaitForMultipleObjects
GetCurrentThread
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteExA
ntdll
ZwUnmapViewOfSection
Sections
.code Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: