Static task
static1
Behavioral task
behavioral1
Sample
8795a9dbbba7bddf52062bf74ff20b32df7e90e524bc3196a87c57f591aafbb8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8795a9dbbba7bddf52062bf74ff20b32df7e90e524bc3196a87c57f591aafbb8.exe
Resource
win10v2004-20220812-en
General
-
Target
8795a9dbbba7bddf52062bf74ff20b32df7e90e524bc3196a87c57f591aafbb8
-
Size
272KB
-
MD5
f232e70d85457dff70b0227930be62db
-
SHA1
c24bb185689af68977c16b2cefcebdfa8295c31e
-
SHA256
8795a9dbbba7bddf52062bf74ff20b32df7e90e524bc3196a87c57f591aafbb8
-
SHA512
dd35f98e77546611cefec6d9fb10a89c05a01bfdcc6b278a18ef86df74752e528e3c08adf5430122cf16487092f8b4320a708cffa0646dd845859f15929b3425
-
SSDEEP
6144:KJh+NKF7EEZiY20I+2in58xrbLywoN4Z:mhv7EEZinnin58xrbLywoN
Malware Config
Signatures
Files
-
8795a9dbbba7bddf52062bf74ff20b32df7e90e524bc3196a87c57f591aafbb8.exe windows x86
9336d590162998c98c979636ea84e161
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GetStdHandle
AllocConsole
ReadConsoleA
ReadFile
SetHandleInformation
CreatePipe
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
OpenProcess
GetCurrentProcessId
GetDriveTypeA
GetModuleFileNameA
GetCurrentProcess
FindClose
FindNextFileA
FindFirstFileA
ReleaseSemaphore
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateThread
WaitForSingleObject
CreateSemaphoreA
InitializeCriticalSection
HeapDestroy
GetStartupInfoA
CreateProcessA
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
GetLogicalDriveStringsA
Sleep
GetStringTypeExA
GetSystemInfo
VirtualQuery
VirtualProtect
SetEnvironmentVariableA
SetEndOfFile
GetLocaleInfoW
CreateFileA
GetOEMCP
GetACP
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetVersionExA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
GetFileType
IsValidCodePage
IsValidLocale
IsBadWritePtr
VirtualAlloc
VirtualFree
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
TerminateProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
SetUnhandledExceptionFilter
GetModuleHandleA
HeapSize
SetFilePointer
FlushFileBuffers
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapCreate
user32
LoadStringA
advapi32
DuplicateToken
MapGenericMask
AccessCheck
OpenProcessToken
GetTokenInformation
LookupAccountSidA
GetFileSecurityA
ws2_32
sendto
recvfrom
gethostname
gethostbyname
htons
ioctlsocket
connect
select
send
setsockopt
recv
closesocket
inet_ntoa
WSAStartup
inet_addr
WSACleanup
socket
wininet
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetOptionA
HttpSendRequestA
InternetCloseHandle
InternetQueryOptionA
mpr
WNetAddConnection2A
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ