Static task
static1
Behavioral task
behavioral1
Sample
8f819a454e905a63922a7d1b14cb599e1f2d08d696ce6775ce21c80d1028155e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8f819a454e905a63922a7d1b14cb599e1f2d08d696ce6775ce21c80d1028155e.exe
Resource
win10v2004-20230220-en
General
-
Target
8f819a454e905a63922a7d1b14cb599e1f2d08d696ce6775ce21c80d1028155e
-
Size
555KB
-
MD5
3b1b503e0c51d0a645631a68bc860a09
-
SHA1
140571eb72f80df0c70048ad6c135ace122126b0
-
SHA256
8f819a454e905a63922a7d1b14cb599e1f2d08d696ce6775ce21c80d1028155e
-
SHA512
656ccf864069ca9ec27a2e149da51fc46d190bbd4c87c8f61b38aa1d3f697783894fce36871ace0c0a91736b3ac3dd1fb741748f5ce5df3d9b6dd60a339981e7
-
SSDEEP
12288:PmLJDVtDee1P4kCleBm+kMH6xFyuC7j/9xYRO:PmLJ7DRP7geu0GJRO
Malware Config
Signatures
Files
-
8f819a454e905a63922a7d1b14cb599e1f2d08d696ce6775ce21c80d1028155e.exe windows x86
0bc00e58ebc8eff1dda12fc13d6d980a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
UnmapViewOfFile
CreateFileA
FindClose
FindFirstFileA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
WaitForMultipleObjects
GetTickCount
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
lstrcatA
lstrlenA
lstrcpyA
LocalFileTimeToFileTime
CreateDirectoryA
GetFileAttributesA
SetFileTime
WriteFile
FormatMessageA
DeleteFileA
FreeConsole
GetFullPathNameA
GetDriveTypeA
GetFileInformationByHandle
VirtualFree
FileTimeToLocalFileTime
FileTimeToSystemTime
WaitForSingleObject
GetLastError
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
ExpandEnvironmentStringsA
PeekNamedPipe
GetSystemDirectoryA
VerSetConditionMask
VerifyVersionInfoA
SleepEx
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcessHeap
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetModuleFileNameA
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
Sleep
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
HeapAlloc
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
HeapReAlloc
GetModuleHandleA
GetStdHandle
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
FreeLibrary
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
user32
wsprintfA
advapi32
CryptDestroyHash
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyKey
CryptEncrypt
CryptImportKey
shell32
ShellExecuteA
ws2_32
bind
listen
setsockopt
closesocket
WSAGetLastError
htons
htonl
WSASetLastError
__WSAFDIsSet
select
recv
send
WSAIoctl
getsockname
ntohs
getsockopt
getpeername
socket
connect
freeaddrinfo
getaddrinfo
sendto
recvfrom
accept
ioctlsocket
gethostname
ntohl
WSACleanup
WSAStartup
wldap32
ord35
ord79
ord33
ord32
ord27
ord41
ord46
ord200
ord30
ord50
ord26
ord60
ord211
ord143
ord22
ord301
crypt32
CertFreeCertificateContext
Sections
.text Size: 374KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ