Static task
static1
Behavioral task
behavioral1
Sample
8d0bde01d9e006ffef181ba5ddca455e7db8c1abea14a7bbd7c163a0663a03d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d0bde01d9e006ffef181ba5ddca455e7db8c1abea14a7bbd7c163a0663a03d8.exe
Resource
win10v2004-20220812-en
General
-
Target
8d0bde01d9e006ffef181ba5ddca455e7db8c1abea14a7bbd7c163a0663a03d8
-
Size
696KB
-
MD5
894d9d22877804d732f57d22afda0c5d
-
SHA1
e7017aec3ff5cbd8af359f9b3fb5b671b953f3b0
-
SHA256
8d0bde01d9e006ffef181ba5ddca455e7db8c1abea14a7bbd7c163a0663a03d8
-
SHA512
07cecc13ceacb11fc03fb124b80a2810f107494e54fe9933e9624895791b1fde027a713ddf9bbeb30c2b4ca80935f00cba290bc3791c7f75b3454964222ee0ed
-
SSDEEP
12288:T3A9N/GQqf1dDBl3O8spqJbfx/NkzbZVEyUefTpU7R:T3A9A/fjxR/NgZjT
Malware Config
Signatures
Files
-
8d0bde01d9e006ffef181ba5ddca455e7db8c1abea14a7bbd7c163a0663a03d8.exe windows x86
8b911c10f99913c66ecd4cf3cd91289a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
iphlpapi
GetAdaptersInfo
beworkshop
RSADecrypt
kernel32
ExitProcess
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
TerminateProcess
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetSystemInfo
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadCodePtr
ReleaseMutex
CreateMutexA
DeviceIoControl
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
GetVolumeInformationA
HeapFree
HeapAlloc
GetProcessHeap
CloseHandle
GetLastError
ReadFile
GetTempPathA
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetSystemWindowsDirectoryA
DeleteFileA
GetComputerNameA
MoveFileA
CreateDirectoryA
GetModuleFileNameA
MultiByteToWideChar
GetVersion
CompareStringA
lstrlenW
CompareStringW
lstrcmpiA
lstrlenA
GlobalReAlloc
MulDiv
GlobalUnlock
GlobalLock
GlobalSize
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
LocalAlloc
FileTimeToSystemTime
GetProfileIntA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
FreeResource
VirtualProtect
GetProcAddress
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
lstrcpyA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
IsBadReadPtr
IsBadWritePtr
SetLastError
GlobalFree
CopyFileA
GlobalAlloc
FormatMessageA
lstrcpynA
LocalFree
LoadLibraryA
FreeLibrary
GetTickCount
user32
InvalidateRgn
CopyAcceleratorTableA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
SetWindowContextHelpId
PostQuitMessage
DestroyMenu
ValidateRect
CharNextA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
MoveWindow
SetWindowTextA
IsDialogMessageA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
MessageBoxA
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
OffsetRect
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
MapDialogRect
SetWindowPos
wsprintfA
GetParent
GetNextDlgGroupItem
MessageBeep
EnableWindow
PostMessageA
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
DispatchMessageA
ShowWindow
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
SetFocus
GetWindowRect
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostThreadMessageA
DrawFrameControl
GetDoubleClickTime
WindowFromPoint
IsWindowVisible
ClientToScreen
IsRectEmpty
CopyRect
ClipCursor
GetCursorPos
GetMessagePos
IsClipboardFormatAvailable
GetSystemMetrics
GetClassInfoA
DefWindowProcA
GrayStringA
GetMenu
TranslateMessage
GetMessageA
PeekMessageA
WaitForInputIdle
RegisterWindowMessageA
RegisterClipboardFormatA
SendMessageA
AppendMenuA
GetSystemMenu
LoadIconA
LoadBitmapA
CharUpperA
ReleaseDC
GetDC
SystemParametersInfoA
SetRect
InflateRect
FillRect
FrameRect
DrawEdge
DrawTextA
GetSysColor
IsWindow
GetKeyState
PtInRect
IntersectRect
InvertRect
GetClientRect
ScreenToClient
InvalidateRect
SetTimer
KillTimer
GetCapture
GetFocus
TabbedTextOutA
DrawTextExA
gdi32
RestoreDC
SetBkMode
SetMapMode
LineTo
MoveToEx
DeleteObject
GetViewportExtEx
GetWindowExtEx
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SaveDC
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetTextColor
GetStockObject
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CopyMetaFileA
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
GetBkColor
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
CreateFontA
CreatePen
GetCurrentObject
GetTextMetricsA
GetDeviceCaps
GetTextExtentPoint32A
SetViewportExtEx
CreateFontIndirectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
InitializeSecurityDescriptor
RegCloseKey
SetSecurityDescriptorDacl
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
GetUserNameA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegQueryValueExA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHFileOperationA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHBrowseForFolderA
comctl32
ImageList_AddMasked
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_GetImageInfo
ImageList_Destroy
ImageList_Create
ord17
ImageList_Draw
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
StrStrIA
oledlg
ord8
ole32
CoTaskMemFree
ReleaseStgMedium
CoTaskMemAlloc
OleDuplicateData
CLSIDFromProgID
CLSIDFromString
OleGetClipboard
OleSetClipboard
OleIsCurrentClipboard
OleFlushClipboard
DoDragDrop
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysAllocStringByteLen
VariantCopy
SysStringLen
SafeArrayDestroy
SysAllocString
VarUdateFromDate
SystemTimeToVariantTime
SysFreeString
wsock32
getsockname
gethostbyname
WSAStartup
recv
send
inet_addr
connect
socket
bind
WSACleanup
closesocket
ioctlsocket
oleacc
CreateStdAccessibleObject
LresultFromObject
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
Sections
.text Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ