Static task
static1
Behavioral task
behavioral1
Sample
2c018f64bbf137e86aeb9914f971fee6476ebcef21021709779ad24c671e00ad.exe
Resource
win7-20220812-en
General
-
Target
2c018f64bbf137e86aeb9914f971fee6476ebcef21021709779ad24c671e00ad
-
Size
732KB
-
MD5
3ad8e8719a46c584ce5d77d2c60190a0
-
SHA1
069184bede96e6f2ca22f8b41cfac7bc8700ce39
-
SHA256
2c018f64bbf137e86aeb9914f971fee6476ebcef21021709779ad24c671e00ad
-
SHA512
92b91370f149d1445e6f9df3876538f83b969983d0410bee8fa51ecfbed621f399d9e78f7f7104ca4734d0209bf2a6ab1b17dd1f9c4a2c1c537d569e6d2cd8d8
-
SSDEEP
6144:aMtOambSiR8yHGR+Yh4Ul68Qc8E+JS4Npb:aMFJimJhhb8Xw4H
Malware Config
Signatures
Files
-
2c018f64bbf137e86aeb9914f971fee6476ebcef21021709779ad24c671e00ad.exe windows x86
eb43194f65acd09c332473aa3fee8941
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
SendMessageA
IsCharAlphaNumericA
wsprintfA
GetClassNameA
oleaut32
GetErrorInfo
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
fwrite
toupper
_iob
fprintf
_splitpath
??2@YAPAXI@Z
_vsnprintf
_CxxThrowException
calloc
fseek
ftell
fread
strtoul
strchr
atoi
_strlwr
strrchr
fopen
fgets
fclose
system
mbstowcs
wcslen
wcscpy
_access
strcpy
memcmp
strcat
wcscat
strstr
__CxxFrameHandler
free
malloc
strcmp
sscanf
memcpy
srand
strncpy
strtok
memset
rand
_snprintf
strlen
sprintf
strncat
_strcmpi
_XcptFilter
_strdup
kernel32
LocalAlloc
lstrcmpiA
Sleep
CreateThread
GetModuleFileNameA
ExitThread
GetLastError
InitializeCriticalSectionAndSpinCount
LocalFree
GetStartupInfoA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLocalTime
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileSize
CreateMutexA
ReleaseMutex
ExpandEnvironmentStringsA
lstrlenA
lstrcmpA
lstrcpynA
lstrcpyA
lstrcatA
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
GetProcAddress
LoadLibraryA
GetLocaleInfoA
GetSystemDirectoryA
GetDateFormatA
GetTimeFormatA
GlobalMemoryStatus
GetVersion
GetCurrentProcessId
GetCurrentDirectoryA
DeviceIoControl
TerminateThread
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetVersionExA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
GetTempPathA
MoveFileA
ExitProcess
WideCharToMultiByte
GetModuleHandleA
GetFileAttributesA
SetFileAttributesA
CopyFileA
DeleteFileA
CreateFileA
TransactNamedPipe
WriteFile
CloseHandle
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
Sections
Size: 488KB - Virtual size: 488KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE