Static task
static1
Behavioral task
behavioral1
Sample
2cb124b62c408cdfaf3d7183b342d451578e09aaaf24118e141b2d88d986a364.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2cb124b62c408cdfaf3d7183b342d451578e09aaaf24118e141b2d88d986a364.exe
Resource
win10v2004-20220901-en
General
-
Target
2cb124b62c408cdfaf3d7183b342d451578e09aaaf24118e141b2d88d986a364
-
Size
228KB
-
MD5
26d4c62092d5b3f7cbcc65c66b916ee0
-
SHA1
7193c4e9bf60fc4e4f1df581daa1c4daaca6514a
-
SHA256
2cb124b62c408cdfaf3d7183b342d451578e09aaaf24118e141b2d88d986a364
-
SHA512
956c7c9712e2a4e4556e505aff7332367c76ae87b357375231d2b8b56134fc418ae016f32ad42fe426456f560712a5192576f48ec7c8b8c7ae663227d7ea2249
-
SSDEEP
6144:Hwqef5Y7Xq2zdwL79P5zKFMJJMoyI9cNR+Z:+5m/Y71NKqAZNRG
Malware Config
Signatures
Files
-
2cb124b62c408cdfaf3d7183b342d451578e09aaaf24118e141b2d88d986a364.exe windows x86
a33797f2f122da65167f2e7563fcee17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
ReadProcessMemory
GetThreadContext
CreateProcessA
TerminateProcess
CloseHandle
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
WriteFile
CreateFileA
lstrcpyA
GetLastError
CreateMutexA
GetWindowsDirectoryA
ReadFile
SetFilePointer
SizeofResource
LockResource
LoadResource
FindResourceA
EnumResourceNamesA
GetFileAttributesA
lstrlenA
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
MoveFileExA
LoadLibraryA
DeleteFileA
SetFileAttributesA
LoadLibraryExA
HeapFree
UnmapViewOfFile
GetFileSize
HeapAlloc
GetProcessHeap
HeapCreate
GetTempPathA
WinExec
lstrcatA
FindClose
FindNextFileA
Sleep
FileTimeToSystemTime
SetCurrentDirectoryA
FindFirstFileA
GetModuleHandleA
WaitForSingleObject
CreateEventA
CreateThread
OpenMutexA
GetModuleFileNameA
CompareStringW
CompareStringA
GetLocaleInfoA
SetEnvironmentVariableA
GetProcAddress
FreeLibrary
CopyFileA
VirtualAlloc
FileTimeToLocalFileTime
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
GetVersionExA
GetStartupInfoA
GetFullPathNameA
GetCurrentDirectoryA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapSize
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
user32
DispatchMessageA
LoadCursorA
RegisterClassA
DefWindowProcA
PostQuitMessage
CreateWindowExA
wsprintfA
GetMessageA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ