Static task
static1
Behavioral task
behavioral1
Sample
2e889ba618ca8aa8b64d70c38df957dfc09b5c0f38d4fea3c5b1e419675694ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e889ba618ca8aa8b64d70c38df957dfc09b5c0f38d4fea3c5b1e419675694ec.exe
Resource
win10v2004-20220812-en
General
-
Target
2e889ba618ca8aa8b64d70c38df957dfc09b5c0f38d4fea3c5b1e419675694ec
-
Size
24KB
-
MD5
663f8c22b444c017fb69103828bc17de
-
SHA1
f619f785feee493047f70370c571fa98c8a26762
-
SHA256
2e889ba618ca8aa8b64d70c38df957dfc09b5c0f38d4fea3c5b1e419675694ec
-
SHA512
3564f0023317394ac0b887b1448812d7431eb78c4c51e9b789d9a5883d770ebb674c6254d2b527b86461bb9cd1a6328a6aaed230f40372442f4cdb074b1bf673
-
SSDEEP
384:Xy5WrYxRLFH7GFbG5ZPJ9ZTuDvXx3hOzZw60GIziXArJCf3:XtrYxRLs05FJLTWx3hOFhIGXArJCf3
Malware Config
Signatures
Files
-
2e889ba618ca8aa8b64d70c38df957dfc09b5c0f38d4fea3c5b1e419675694ec.exe windows x86
b0dc0479b3900f2f0504e5442207b687
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
CloseHandle
WriteFile
ExitProcess
HeapFree
lstrcpynA
HeapReAlloc
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
MultiByteToWideChar
GetFileSize
GetFileAttributesA
SetFilePointer
CopyFileA
MoveFileA
GetSystemDirectoryA
lstrcmpA
ExpandEnvironmentStringsA
GetCommandLineA
lstrcatA
GetModuleFileNameA
GetModuleHandleA
ReadFile
FindFirstFileA
GetSystemTime
HeapDestroy
HeapCreate
GetProcessHeap
InterlockedIncrement
InterlockedExchange
InterlockedExchangeAdd
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualAllocEx
CreateProcessA
GetProcAddress
GetComputerNameA
GetSystemInfo
GetVolumeInformationA
GetVersionExA
DeleteFileA
FindNextFileA
FindClose
GetTickCount
GetTempPathA
CreateFileA
Sleep
LocalFree
GetLastError
lstrcpyA
SystemTimeToFileTime
HeapAlloc
user32
CreateWindowExA
wsprintfA
RegisterClassA
SetActiveWindow
GetActiveWindow
ShowWindow
PostQuitMessage
DefWindowProcA
GetWindowTextA
EnumWindows
SetWindowTextA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoCreateInstance
CoInitialize
oleaut32
VariantChangeType
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocString
VariantClear
wininet
InternetGetConnectedState
msvcrt
_CxxThrowException
??3@YAXPAX@Z
__dllonexit
_onexit
??1type_info@@UAE@XZ
__CxxFrameHandler
memcmp
rand
memcpy
memset
ws2_32
inet_addr
shlwapi
StrStrIA
StrChrA
StrDupA
StrRChrA
StrStrA
netapi32
NetScheduleJobAdd
dnsapi
DnsQuery_A
DnsRecordListFree
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE