Static task
static1
Behavioral task
behavioral1
Sample
2d22e6b4848e6c0750df6e8c2b4eab70f5dca33b78521a7554c85e1e22b7c479.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d22e6b4848e6c0750df6e8c2b4eab70f5dca33b78521a7554c85e1e22b7c479.exe
Resource
win10v2004-20220812-en
General
-
Target
2d22e6b4848e6c0750df6e8c2b4eab70f5dca33b78521a7554c85e1e22b7c479
-
Size
17KB
-
MD5
46d08b2a6300b11365d2c7e17cd17760
-
SHA1
c976a8d1a6dd1160a47037b582f021a914441fcf
-
SHA256
2d22e6b4848e6c0750df6e8c2b4eab70f5dca33b78521a7554c85e1e22b7c479
-
SHA512
cbb7c59ca4426cfbb9784ffc833c1290bc10897599b6c61e3a14aee80c12f770c071df8c2a87b2fd37eb0fcfd2a92d927740a05db6ce4180873300ccc209253d
-
SSDEEP
384:wBo42xpw2kKkAWJGZvO+Gx+1zl94B941O3jWglFmp56yT:wITw2kKL023fO3dlgT
Malware Config
Signatures
Files
-
2d22e6b4848e6c0750df6e8c2b4eab70f5dca33b78521a7554c85e1e22b7c479.exe windows x86
0f370e731487a8f161681c4a3782489a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
malloc
srand
strchr
strncmp
memmove
strncpy
rand
strstr
sprintf
strcpy
strcat
memset
strtok
strcmp
_snprintf
strlen
_CxxThrowException
ws2_32
WSAStartup
WSACleanup
select
gethostbyname
inet_addr
socket
connect
send
closesocket
recv
htons
shell32
ShellExecuteA
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
kernel32
GetTempFileNameA
ExitThread
CreateFileA
WriteFile
GetModuleFileNameA
CreateProcessA
Sleep
ExpandEnvironmentStringsA
GetLastError
ExitProcess
GetCommandLineA
GetModuleHandleA
GetTickCount
GlobalUnlock
GlobalLock
CopyFileA
SetFileAttributesA
GetFileAttributesA
lstrcmpiA
CreateMutexA
CloseHandle
GlobalAlloc
GetVersionExA
GetLocaleInfoA
WaitForSingleObject
CreateThread
GetDriveTypeA
GetLogicalDriveStringsA
LocalFree
GetStartupInfoA
GetWindowsDirectoryA
user32
MessageBoxA
ShowWindow
VkKeyScanA
keybd_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
IsWindow
SetFocus
SetForegroundWindow
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterDeviceNotificationA
CreateWindowExA
RegisterClassExA
shlwapi
PathRemoveFileSpecA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE