Static task
static1
Behavioral task
behavioral1
Sample
2d40f0f7dbe9289a98b74c398a96389787007550c1c794f10d4cd4eeb60b9d3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d40f0f7dbe9289a98b74c398a96389787007550c1c794f10d4cd4eeb60b9d3a.exe
Resource
win10v2004-20220812-en
General
-
Target
2d40f0f7dbe9289a98b74c398a96389787007550c1c794f10d4cd4eeb60b9d3a
-
Size
244KB
-
MD5
77e0d82085dc0a20659bd38ae45d7d92
-
SHA1
c8206b29df79c04f496c4817f62cf34199f8e246
-
SHA256
2d40f0f7dbe9289a98b74c398a96389787007550c1c794f10d4cd4eeb60b9d3a
-
SHA512
8aea13ae2a815d99aef4695d2971663de35b60d7dc8af71830bde4f87a1f5ab6cbedc6165b5ba8a4a027804784cf488d962f0cfb00bab6e83956e3b76aab87ec
-
SSDEEP
3072:lfV20EAn/C6U4eJ4X7O6mI1TP7rAg0FuHiL0/tU4DaEKpY:lfVCwC6U4eJ4X7OVkD7rAOjO4DaLY
Malware Config
Signatures
Files
-
2d40f0f7dbe9289a98b74c398a96389787007550c1c794f10d4cd4eeb60b9d3a.exe windows x86
9241529931b02bf1f2fbbe6d6d620a8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
lstrcmpiA
SetEvent
CloseHandle
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
GetLastError
LoadLibraryExA
GetModuleHandleA
Sleep
GetCurrentThreadId
GetCommandLineA
FlushFileBuffers
CreateFileA
ReadFile
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
CreateMutexA
WaitForSingleObject
FindResourceA
ReleaseMutex
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
LocalFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharNextA
wsprintfA
PostThreadMessageA
DispatchMessageA
GetMessageA
UnregisterClassA
advapi32
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ