Static task
static1
Behavioral task
behavioral1
Sample
2c82a885ab2f3fec344f3fdff9e58e39432c99d59fd7f3f8227ed1159b9ef861.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c82a885ab2f3fec344f3fdff9e58e39432c99d59fd7f3f8227ed1159b9ef861.exe
Resource
win10v2004-20220812-en
General
-
Target
2c82a885ab2f3fec344f3fdff9e58e39432c99d59fd7f3f8227ed1159b9ef861
-
Size
196KB
-
MD5
25bf81b689c895d0e94aac255d625aff
-
SHA1
b798f5b08712bd5016d679f812fcaf1a98ba7f43
-
SHA256
2c82a885ab2f3fec344f3fdff9e58e39432c99d59fd7f3f8227ed1159b9ef861
-
SHA512
3a2756336526385141b8d548de0e83b87d7332f2f28d9bcd1a9c403369fb23e98ef89b01b1fb41c9839afd47e2f547db4a7375e6b32628fe02959e61916fcceb
-
SSDEEP
3072:gwXfRT/U4ut20zdsBcw8W+qQEVXEBidxBx1WL1WgNJzyYzJ/NlvDzW:ggrUcxIEVXtxBH2WAbnDzW
Malware Config
Signatures
Files
-
2c82a885ab2f3fec344f3fdff9e58e39432c99d59fd7f3f8227ed1159b9ef861.exe windows x86
ab8dcdd0ce0fa6db4ae2b4925562c5b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
userenv
GetUserProfileDirectoryA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLocaleInfoW
SetEndOfFile
GetLastError
CloseHandle
ReadFile
CreateFileA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
InterlockedDecrement
SetFileAttributesA
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetModuleFileNameA
Sleep
GetVersion
WinExec
WriteFile
GetTempPathA
InterlockedIncrement
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
GetCurrentProcess
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
GetCurrentProcessId
GetTickCount
LocalFree
VirtualQuery
GetStartupInfoA
GetSystemInfo
GetCommandLineA
CopyFileA
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
RemoveDirectoryA
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
LeaveCriticalSection
TlsAlloc
SetUnhandledExceptionFilter
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
user32
wsprintfA
SetTimer
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
BeginPaint
EndPaint
PostQuitMessage
EndDialog
comdlg32
GetFileTitleA
advapi32
RegQueryValueExA
OpenProcessToken
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetDesktopFolder
ShellExecuteA
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
StringFromGUID2
CoCreateGuid
oleaut32
SysAllocStringLen
VariantClear
VariantInit
VariantCopy
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
GetErrorInfo
shlwapi
PathFileExistsA
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ