Static task
static1
Behavioral task
behavioral1
Sample
2b1ce53393b962ab491729c90ea0601d40fc1914f6ac2fc7722507756e6f5d68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2b1ce53393b962ab491729c90ea0601d40fc1914f6ac2fc7722507756e6f5d68.exe
Resource
win10v2004-20220901-en
General
-
Target
2b1ce53393b962ab491729c90ea0601d40fc1914f6ac2fc7722507756e6f5d68
-
Size
70KB
-
MD5
851962d8153c43100b703c93744dcbfb
-
SHA1
82b86da77676fbb3f65a64a3998c544ab07133f5
-
SHA256
2b1ce53393b962ab491729c90ea0601d40fc1914f6ac2fc7722507756e6f5d68
-
SHA512
277aa3a2319224a9664b71a7ace61cd1dcbeebf51ede358a6d1b286166aaec75092b1657d173c27e4485c6b68afcdc8558ed2c32d7e3608be0cf83b0741bb9d6
-
SSDEEP
1536:kpB/plCXRzIGRnDyB2QypAPvVf19GeupnhYKn4SXu:kpRplChMGRDy3IA97GeupnhH4SXu
Malware Config
Signatures
Files
-
2b1ce53393b962ab491729c90ea0601d40fc1914f6ac2fc7722507756e6f5d68.exe windows x86
f36b46f28022ee4585e06a33f3539738
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetVersionExA
WaitForSingleObject
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
WinExec
lstrcatA
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceA
GlobalAlloc
EnterCriticalSection
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcmpA
FlushInstructionCache
GetCurrentProcess
FindClose
FindFirstFileA
LeaveCriticalSection
Sleep
GetTickCount
WriteFile
MultiByteToWideChar
DeleteFileA
CreateFileA
SetFilePointer
CreateThread
ResumeThread
GetModuleHandleA
GetProcAddress
CreateMutexA
GetLastError
CloseHandle
GetTempPathA
lstrlenA
CreateDirectoryA
lstrcpyA
GlobalUnlock
CreateProcessA
GetStartupInfoA
user32
CharLowerA
PostMessageA
ShowWindow
GetWindowRect
SetWindowPos
SetWindowTextA
SetTimer
InvalidateRgn
EndDialog
GetDlgItem
EnableWindow
DefWindowProcA
DialogBoxParamA
KillTimer
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetWindowTextLengthA
GetClassNameA
RedrawWindow
GetDesktopWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
DestroyWindow
SetFocus
MessageBeep
SetDlgItemTextA
GetWindowTextA
GetDlgItemInt
SetDlgItemInt
CreateWindowExA
MessageBoxA
GetActiveWindow
GetDC
ReleaseDC
GetFocus
IsChild
GetSysColor
IsWindow
SetRect
wsprintfA
LoadStringA
CharNextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DialogBoxIndirectParamA
GetWindowLongA
GetParent
GetWindow
GetClientRect
MapWindowPoints
SendMessageA
SystemParametersInfoA
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateSolidBrush
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
OleCreateFontIndirect
DispCallFunc
SysAllocString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
VariantClear
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetErrorDlg
InternetQueryOptionA
InternetCloseHandle
msvcrt
strstr
??2@YAPAXI@Z
_ftol
atol
atoi
_mbsrchr
atof
_mbscmp
_mbsstr
free
wcslen
_ismbcspace
memmove
vsprintf
malloc
_ismbcdigit
_purecall
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
shell32
ShellExecuteA
Sections
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ