Static task
static1
Behavioral task
behavioral1
Sample
2fe004c92bf551aa090effd4ad23793b3bee03468c4a0d43ad240dbeac258dcc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2fe004c92bf551aa090effd4ad23793b3bee03468c4a0d43ad240dbeac258dcc.exe
Resource
win10v2004-20220812-en
General
-
Target
2fe004c92bf551aa090effd4ad23793b3bee03468c4a0d43ad240dbeac258dcc
-
Size
97KB
-
MD5
05914a3748ce7b94cb16a249c01eb99d
-
SHA1
1936777f6063060cfe94193e7312fd4590e0d8a5
-
SHA256
2fe004c92bf551aa090effd4ad23793b3bee03468c4a0d43ad240dbeac258dcc
-
SHA512
6858ce9617803de166b4c50be5d001f68464e79b40467bbefbbbf89f4bf08b5faa5ee4d33eee3eff2d0eb35e7739a2275c93ec7d29beb8c6c02b4b78a780c708
-
SSDEEP
1536:kLTNtosua4mJQ02suWRt/+/ZRdXXAAbfCuxvHnZG+sqbUvKQ1:mNasBHT53uvdnAAbfXxvE+smyKO
Malware Config
Signatures
Files
-
2fe004c92bf551aa090effd4ad23793b3bee03468c4a0d43ad240dbeac258dcc.exe windows x86
85ba3b7dc7bd6d58c4a26ad72886b660
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
tan
strcmp
memmove
calloc
memcpy
kernel32
GetStringTypeA
HeapFree
MoveFileExA
CreateEventA
GetDateFormatA
GetStdHandle
LoadLibraryExA
WideCharToMultiByte
GetACP
EnterCriticalSection
VirtualQuery
FormatMessageA
MulDiv
SetErrorMode
GetVersionExA
GetCurrentProcess
LoadLibraryA
SetEvent
HeapAlloc
LocalAlloc
SetEndOfFile
SetHandleCount
lstrcmpiA
CloseHandle
ResetEvent
GetFileSize
GlobalDeleteAtom
GetCommandLineA
DeleteFileA
VirtualAllocEx
GetModuleFileNameA
GetVersion
SetFilePointer
GetLocalTime
LocalReAlloc
ExitThread
FindClose
SizeofResource
GetModuleHandleA
GetCurrentProcessId
GetThreadLocale
lstrcpyA
GetStartupInfoA
InitializeCriticalSection
WaitForSingleObject
LockResource
GetOEMCP
GetFileAttributesA
GetSystemDefaultLangID
lstrlenA
GetStringTypeW
GlobalAlloc
CreateFileA
GetFileType
FreeLibrary
RaiseException
MoveFileA
Sleep
ExitProcess
GetCPInfo
LoadResource
GetDiskFreeSpaceA
SetLastError
VirtualFree
GetCurrentThreadId
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
DragQueryFileA
shlwapi
SHDeleteValueA
user32
IsChild
MessageBoxA
IsWindowVisible
SetCursor
GetFocus
GetCursor
GetDesktopWindow
DefWindowProcA
IsDialogMessageA
GetClipboardData
SetWindowPos
GetSysColor
DrawIconEx
CheckMenuItem
GetMenuItemID
FrameRect
GetActiveWindow
GetSubMenu
EnumChildWindows
CreatePopupMenu
CharLowerBuffA
GetCapture
DefMDIChildProcA
GetDC
DefFrameProcA
GetMenuItemInfoA
GetForegroundWindow
GetMenuItemCount
GetDCEx
CharLowerA
SetWindowLongA
EnableScrollBar
gdi32
CreateBrushIndirect
CopyEnhMetaFileA
CreateCompatibleBitmap
CreateFontIndirectA
ole32
CreateStreamOnHGlobal
CoGetMalloc
CoUnmarshalInterface
CreateBindCtx
CoUninitialize
CoDisconnectObject
CoCreateFreeThreadedMarshaler
version
VerInstallFileA
oleaut32
VariantChangeType
GetErrorInfo
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE