Static task
static1
Behavioral task
behavioral1
Sample
a2f32d92bb2216946fcda49acc7138ef964264c9ab49012fff6d3e1a77f91ecc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2f32d92bb2216946fcda49acc7138ef964264c9ab49012fff6d3e1a77f91ecc.exe
Resource
win10v2004-20220812-en
General
-
Target
a2f32d92bb2216946fcda49acc7138ef964264c9ab49012fff6d3e1a77f91ecc
-
Size
316KB
-
MD5
81f49ae0ffa71a76229aa50afed2f654
-
SHA1
3ab787f35492ca979a534dcd9cce5c6137e947d4
-
SHA256
a2f32d92bb2216946fcda49acc7138ef964264c9ab49012fff6d3e1a77f91ecc
-
SHA512
15ae04c581e4ab62f1137d0fb51b250e779c3533afb730ad626d0c9d5587fa98d93263b5d0858380bb5d1d763f4fbd5ec2c966d0c7a31f508ab17d01379aad62
-
SSDEEP
6144:ZwuWV06v4VWIkMKhSLvLMit/LIrBjxnY8w2ZHw4e27oIHweJfzChfuNoA+iWTBvj:XWV06v4VWI9K9itTIBFYv4k1eJfzChf7
Malware Config
Signatures
Files
-
a2f32d92bb2216946fcda49acc7138ef964264c9ab49012fff6d3e1a77f91ecc.exe windows x86
2c7c93cc4af05792919c246e1e2c399a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
GetCurrentProcessId
CreateSemaphoreA
ReleaseSemaphore
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
FileTimeToLocalFileTime
GetDriveTypeA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
CreateThread
ExitThread
CreateFileA
DeviceIoControl
CloseHandle
GetSystemDirectoryA
GetLastError
WaitForMultipleObjects
DuplicateHandle
GetThreadPriority
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
ResetEvent
GetProcessAffinityMask
InterlockedExchange
InterlockedExchangeAdd
CreateEventA
InterlockedCompareExchange
SetEvent
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
LoadLibraryA
GetProcAddress
FreeLibrary
OutputDebugStringA
Sleep
SetEndOfFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateProcessA
GetCurrentThreadId
GetVersionExA
PeekNamedPipe
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetStartupInfoA
CreatePipe
QueryDosDeviceA
GetLogicalDrives
WinExec
SetConsoleCtrlHandler
CreateMutexA
WaitForSingleObject
ReleaseMutex
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
Module32Next
Module32First
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetModuleHandleA
GetVersion
GetTickCount
FindNextFileA
FindFirstFileA
FindClose
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapAlloc
HeapReAlloc
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetStdHandle
GetFileType
MoveFileA
RtlUnwind
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
DeleteCriticalSection
FatalAppExitA
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
WriteFile
RaiseException
ReadFile
SetFilePointer
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
user32
SetProcessWindowStation
GetProcessWindowStation
OpenDesktopA
SetThreadDesktop
CloseWindowStation
GetThreadDesktop
OpenWindowStationA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
DefWindowProcA
KillTimer
SetTimer
CloseDesktop
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
advapi32
RegCreateKeyExA
RegSetValueExA
OpenEventLogA
ReadEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
GetTokenInformation
LookupAccountSidA
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateProcessAsUserA
RegDeleteValueA
psapi
GetProcessImageFileNameA
GetProcessMemoryInfo
iphlpapi
IcmpCloseHandle
IcmpSendEcho
IcmpCreateFile
SendARP
GetAdaptersInfo
GetAdaptersAddresses
GetIfTable
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
netapi32
Netbios
NetApiBufferFree
NetUserEnum
wtsapi32
WTSEnumerateProcessesA
WTSFreeMemory
rpcrt4
UuidFromStringA
ws2_32
gethostbyname
WSACleanup
getsockname
send
inet_ntoa
ioctlsocket
recv
recvfrom
select
htons
socket
sendto
closesocket
inet_addr
gethostname
WSAGetLastError
connect
WSAStartup
__WSAFDIsSet
Sections
.text Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ