Static task
static1
Behavioral task
behavioral1
Sample
8c8d274af036e0d9a7d58eca7007a59e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c8d274af036e0d9a7d58eca7007a59e.exe
Resource
win10v2004-20220812-en
General
-
Target
8c8d274af036e0d9a7d58eca7007a59e.exe
-
Size
1.3MB
-
MD5
8c8d274af036e0d9a7d58eca7007a59e
-
SHA1
772fd6a47b22e8b87e89c969eef4796f9c135529
-
SHA256
ece7ebcc3ff627558b6efab9ca0dde27735db514bd99aef00725d35c8599c88c
-
SHA512
be76279a97af363387665f98bb8602c8e7c80be8ba24ba8a587161db9f737128df8cc892657a8331e3d3a64a2f5cefdb71f7eb5add0cd5e629e472edc3e3eecf
-
SSDEEP
24576:JUbGZg2XnRrJAF1B/lBiwlcRiryqbCxDLk2FyOiZkqq1thfP+rsNGpT0ErTjpTbL:JUiZg2XnNylXSFqb84OiZrq1DfP+rsNk
Malware Config
Signatures
Files
-
8c8d274af036e0d9a7d58eca7007a59e.exe.exe windows x86
ae59d36ed05eb53b902732c00e93d134
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
ExitProcess
WriteConsoleW
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
LCMapStringW
CompareStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
WriteFile
GetProcessHeap
GetCurrentProcessId
GetLastError
GetCommandLineA
GetCurrentThreadId
GetCurrentProcess
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
DecodePointer
HeapAlloc
HeapFree
GetModuleHandleExW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
GetStdHandle
GetModuleFileNameW
user32
EnableWindow
CharUpperA
InvalidateRect
FindWindowA
GetDlgItem
ChildWindowFromPoint
CreateDialogParamA
RedrawWindow
SetClipboardData
GetMessageA
SetWindowPos
MessageBoxW
PostMessageA
GetSystemMetrics
DestroyCursor
OpenClipboard
TranslateAcceleratorA
SendDlgItemMessageA
IsDialogMessageA
GetWindowTextA
LoadAcceleratorsA
GetWindowLongA
wvsprintfA
MessageBoxA
SetFocus
RemoveMenu
gdi32
GdiComment
DeleteObject
GdiAlphaBlend
GdiFlush
GetStockObject
GdiTransparentBlt
comdlg32
GetSaveFileNameA
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
GetUserNameW
shell32
ShellExecuteW
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 370KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ