Static task
static1
Behavioral task
behavioral1
Sample
8f8a82eff20e8530f25ecc0255d0a92b827c7b83b100c240a42ee0603f48095a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f8a82eff20e8530f25ecc0255d0a92b827c7b83b100c240a42ee0603f48095a.exe
Resource
win10v2004-20220812-en
General
-
Target
8f8a82eff20e8530f25ecc0255d0a92b827c7b83b100c240a42ee0603f48095a
-
Size
121KB
-
MD5
fb5f7df444e6e247b80c5ecce7c9e1e5
-
SHA1
c7276bcd503bd1ca651b82f0fdfdd59b3f5ac8c6
-
SHA256
8f8a82eff20e8530f25ecc0255d0a92b827c7b83b100c240a42ee0603f48095a
-
SHA512
01d4a4c6b2494bbf55838c73e41a7729a541c3be97b18c1ee4e1343175c370cefd76da4faf768706f0eb2d70c8c96caedc6b0e6ac42a7f499c2aae3533d9a14b
-
SSDEEP
3072:JYITH0wJT+T6jAgZh2qNxhYYoTqltWBDXHkDB:5TUXujAGnNxmYYGMDXHkD
Malware Config
Signatures
Files
-
8f8a82eff20e8530f25ecc0255d0a92b827c7b83b100c240a42ee0603f48095a.exe windows x86
ce0a345204f3868dd483d023cb104623
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetACP
GetLocaleInfoA
GetThreadLocale
FlushFileBuffers
SetFilePointer
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
ReleaseMutex
GetModuleHandleA
CreateMutexA
TerminateThread
WaitForSingleObject
GetCurrentThreadId
SetEvent
CreateThread
ResetEvent
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
GetShortPathNameA
GetModuleFileNameA
Sleep
FindClose
FindFirstFileA
CreateEventA
SetConsoleCtrlHandler
WriteFile
GetLocalTime
OutputDebugStringA
GetFileSize
lstrcmpiA
LocalFree
LocalAlloc
WideCharToMultiByte
ExpandEnvironmentStringsA
EnterCriticalSection
GetFileAttributesA
ReadFile
GetWindowsDirectoryA
MoveFileExA
FindNextFileA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
CreateDirectoryA
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
CompareStringW
CompareStringA
SetStdHandle
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
VirtualQuery
SetEnvironmentVariableA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
TerminateProcess
SetUnhandledExceptionFilter
IsBadWritePtr
LeaveCriticalSection
GetProcAddress
GetSystemDirectoryA
LoadLibraryA
OpenProcess
GlobalAlloc
GlobalFree
GetCurrentProcess
CreateProcessA
CloseHandle
GetCurrentProcessId
GetLastError
FreeLibrary
GetCurrentDirectoryA
GetVersionExA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
ExitProcess
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
user32
SetTimer
KillTimer
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
GetMessageA
RegisterClassExA
RegisterClassA
CreateWindowExA
ShowWindow
GetWindowLongA
SetWindowLongA
CharNextA
FindWindowA
PostMessageA
PostThreadMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
UnregisterClassA
PostQuitMessage
wsprintfA
DefWindowProcA
advapi32
RegOpenKeyA
RegEnumKeyExA
ControlService
RegCreateKeyExA
RegSetValueExA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
OpenProcessToken
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ