Static task
static1
Behavioral task
behavioral1
Sample
2256b420f3e1a006aa5ddbb64f5b0ee9b25df1c9dc510386832cf2e4a8e56422.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2256b420f3e1a006aa5ddbb64f5b0ee9b25df1c9dc510386832cf2e4a8e56422.exe
Resource
win10v2004-20220812-en
General
-
Target
2256b420f3e1a006aa5ddbb64f5b0ee9b25df1c9dc510386832cf2e4a8e56422
-
Size
684KB
-
MD5
71025185fb30ba2d25ac92e6be5bea90
-
SHA1
aee3da14648acdc133adde1c4b67499958cbfd95
-
SHA256
2256b420f3e1a006aa5ddbb64f5b0ee9b25df1c9dc510386832cf2e4a8e56422
-
SHA512
2be0d27247232de5e7bb008d1e22fd30abc12a4aeee7f743f35047f36465c741aeed0425df20e45a44c7bab94187e78ce23ef8a28d1a7b8a69ac149d47e5c42a
-
SSDEEP
12288:2VvDecSHtjUhGy9U+tEtXr8aGNfP9jSefyc2+Jp15Ro79LDeoewl/GwkAt0:2VCcSHtjwGGUztXr8Eeqc2+JTHo7xe5l
Malware Config
Signatures
Files
-
2256b420f3e1a006aa5ddbb64f5b0ee9b25df1c9dc510386832cf2e4a8e56422.exe windows x86
ee68cd1377833e598955578ebe00095b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
GetModuleHandleA
GetCurrentThreadId
GetVersion
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
Sleep
VirtualFree
WriteFile
HeapCreate
SizeofResource
GetModuleHandleW
GlobalLock
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
CompareStringA
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
GetEnvironmentStrings
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
SetStdHandle
LoadLibraryExW
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
ExpandEnvironmentStringsA
DuplicateHandle
FindFirstFileW
CreateFileMappingA
ResetEvent
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetCurrentProcessId
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
SetEvent
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
GetLocaleInfoA
SetEndOfFile
GlobalAlloc
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
SetUnhandledExceptionFilter
CreateThread
GetLocalTime
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
IsDebuggerPresent
SetLastError
FormatMessageA
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
FreeLibrary
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetStringTypeA
lstrcmpiA
GetCPInfo
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindNextFileA
LockResource
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
GetCommandLineA
GetLastError
GetFileSize
GetTickCount
user32
MessageBoxA
MoveWindow
LoadIconA
LoadCursorA
ClientToScreen
GetDlgItem
GetWindowLongA
CheckMenuItem
SetWindowTextA
SetCapture
IsIconic
GetWindowRect
GetSystemMetrics
KillTimer
BeginPaint
PeekMessageA
MapWindowPoints
DispatchMessageA
CreateWindowExA
GetSubMenu
EnableMenuItem
DialogBoxParamA
GetWindow
TranslateMessage
EnableWindow
ShowWindow
UpdateWindow
GetParent
DestroyWindow
GetClientRect
ReleaseDC
GetCursorPos
GetDC
EndPaint
IsWindow
SetWindowPos
PostQuitMessage
SetForegroundWindow
InvalidateRect
SendMessageA
CallWindowProcA
SetCursor
GetSysColor
GetKeyState
LoadStringA
GetFocus
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
free
_exit
exit
Sections
.text Size: 649KB - Virtual size: 975KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ