Static task
static1
Behavioral task
behavioral1
Sample
8f7fdc199b27808495df6129d20c778ca296130ebf66c317c90fd493cffadfc8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f7fdc199b27808495df6129d20c778ca296130ebf66c317c90fd493cffadfc8.exe
Resource
win10v2004-20221111-en
General
-
Target
8f7fdc199b27808495df6129d20c778ca296130ebf66c317c90fd493cffadfc8
-
Size
4.6MB
-
MD5
9fd338d1cacdb1fc877e66e5d3dfc0d6
-
SHA1
b90e1c1fad10fe902bab7916a579739cb4f98bda
-
SHA256
8f7fdc199b27808495df6129d20c778ca296130ebf66c317c90fd493cffadfc8
-
SHA512
62e98e75524cc0f325a786d8de1a5e648bd935e5567c8a6be1b42b3c56b256d5242c65d535bbfcfcf71b1c271bec2b16919775ad3174f66968a4e03948a055f9
-
SSDEEP
24576:+DvD9pXgo3J1n0ljWSE4PlE9jRIM0d4+7kgbnXubpTp5wEH7H2WBXQMURInag2:aN51GAwf4Tp5ZbDB1UL
Malware Config
Signatures
Files
-
8f7fdc199b27808495df6129d20c778ca296130ebf66c317c90fd493cffadfc8.exe windows x86
17a863562f5974b781502baf11516f6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
GetConsoleOutputCP
WriteConsoleA
WideCharToMultiByte
SetStdHandle
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
HeapReAlloc
HeapSize
HeapAlloc
GetConsoleMode
GetConsoleCP
VirtualFree
HeapFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetACP
LoadLibraryW
OutputDebugStringW
GetFileType
WriteConsoleW
OutputDebugStringA
GetStdHandle
DebugBreak
ExitProcess
VirtualQuery
GetSystemInfo
VirtualAlloc
RaiseException
RtlUnwind
IsBadReadPtr
HeapValidate
GetSystemTimeAsFileTime
ExitThread
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileSizeEx
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
VirtualProtect
GetOEMCP
GetCPInfo
GlobalFlags
GetThreadLocale
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetModuleFileNameW
GetModuleHandleW
GetAtomNameA
SetErrorMode
InterlockedIncrement
InterlockedDecrement
SetEvent
WritePrivateProfileStringA
InterlockedExchange
lstrcmpA
GetCurrentThread
GetLocaleInfoA
ConvertDefaultLocale
EnumResourceLanguagesA
GetCurrentProcessId
CompareStringA
lstrcmpW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
FreeResource
SetLastError
MulDiv
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
CreateFileW
SetThreadPriority
ResumeThread
QueryPerformanceCounter
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
InitializeCriticalSection
QueryPerformanceFrequency
GetSystemTime
CreateEventA
ResetEvent
GetLastError
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
GetModuleFileNameA
GetVersion
WinExec
lstrlenA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
GetTickCount
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
DeviceIoControl
FindClose
FindFirstFileA
MultiByteToWideChar
SetFilePointerEx
ReadFile
GetFileSize
GetFileTime
GetFileAttributesA
WaitForSingleObject
SetVolumeMountPointA
GetVolumeNameForVolumeMountPointA
DefineDosDeviceA
GetLogicalDrives
GetDriveTypeA
GetLogicalDriveStringsA
Sleep
CopyFileA
GetFullPathNameA
WriteFile
CloseHandle
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
OpenEventA
user32
UnpackDDElParam
GetClipboardFormatNameA
GetMessageA
SetRectEmpty
DestroyMenu
GetWindowThreadProcessId
PostQuitMessage
GetCursorPos
GetMenuCheckMarkDimensions
RegisterWindowMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
PeekMessageA
DispatchMessageA
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
WinHelpA
TrackPopupMenu
GetKeyState
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
SetMenu
GetMenu
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
ShowWindow
SetWindowPos
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
SetFocus
LoadIconA
PostThreadMessageA
MapDialogRect
SetWindowContextHelpId
GetForegroundWindow
SetForegroundWindow
LoadAcceleratorsA
WindowFromPoint
GetParent
IsChild
GetLastActivePopup
GetWindow
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
GetFocus
SetCapture
GetCapture
KillTimer
SetTimer
RedrawWindow
ShowOwnedPopups
IsWindowVisible
ValidateRect
InvalidateRgn
InvalidateRect
UpdateWindow
ReleaseDC
GetWindowDC
GetDC
EndPaint
BeginPaint
ScreenToClient
ClientToScreen
MapWindowPoints
GetClientRect
GetWindowRect
BringWindowToTop
PostMessageA
GetSysColor
MessageBeep
ReleaseCapture
SetCursor
IsIconic
GetSystemMenu
SendMessageA
LoadMenuA
SetMenuItemBitmaps
ModifyMenuA
InsertMenuItemA
GetMenuItemInfoA
TranslateAcceleratorA
ReuseDDElParam
CharNextA
CopyAcceleratorTableA
CharUpperA
UnregisterClassA
RegisterClipboardFormatA
IsRectEmpty
SetWindowLongA
IsWindow
InflateRect
SetRect
PtInRect
LoadCursorA
CopyIcon
DrawTextA
LoadBitmapA
SetWindowRgn
GetSystemMetrics
GetMenuItemID
AppendMenuA
GetMenuStringA
GetMenuState
GetSubMenu
GetMenuItemCount
IsMenu
IsWindowEnabled
GetDlgItem
GetWindowLongA
DestroyWindow
CreateDialogIndirectParamA
EnableWindow
SetActiveWindow
GetActiveWindow
GetDesktopWindow
EndDialog
GetSysColorBrush
FillRect
DrawIcon
DrawStateA
TabbedTextOutA
DrawTextExA
GrayStringA
CreatePopupMenu
CheckMenuItem
EnableMenuItem
TranslateMessage
gdi32
GetTextColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
Rectangle
GetPixel
TextOutA
ExtTextOutA
GetTextExtentPoint32A
GetTextMetricsA
Escape
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
MoveToEx
LineTo
ExtSelectClipRgn
GetBkColor
GetRgnBox
CreateSolidBrush
GetStockObject
DeleteObject
CreateRoundRectRgn
CreateCompatibleDC
SelectObject
CreateDIBSection
DeleteDC
BitBlt
GetObjectA
GetDeviceCaps
GetObjectType
CreateRectRgnIndirect
CreatePen
CreateCompatibleBitmap
CreateBitmap
CreateFontA
CreateFontIndirectA
CreatePatternBrush
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
SetThreadToken
OpenThreadToken
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RevertToSelf
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathIsUNCA
PathAppendA
PathStripToRootA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
StringFromGUID2
CoUninitialize
CoInitializeEx
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
OleFlushClipboard
oleaut32
SystemTimeToVariantTime
SysStringLen
SysAllocStringByteLen
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
VariantTimeToSystemTime
Sections
.text Size: 773KB - Virtual size: 772KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ