Static task
static1
Behavioral task
behavioral1
Sample
2d0e058a8b228d5218137814147c05674d5c5ad8d0614f80cd088dba156204e2.exe
Resource
win7-20220812-en
General
-
Target
2d0e058a8b228d5218137814147c05674d5c5ad8d0614f80cd088dba156204e2
-
Size
2.0MB
-
MD5
c890f96e19ee27909df744b788477006
-
SHA1
3561aaad032a7a8697763f05247b4ae80c2aaf56
-
SHA256
2d0e058a8b228d5218137814147c05674d5c5ad8d0614f80cd088dba156204e2
-
SHA512
4f7b7fe68d6add3301b326748c325c1587dc57eca15df340613e47cea4d09172527a24a9c9f4ffac9df0ac23dc315904f1c77363527cd96bbd2ed4089e5c044c
-
SSDEEP
49152:kER9bTChxKCnFnQXBbrtgb/iQvu0UHOa5b:kK96hxvWbrtUTrUHOg
Malware Config
Signatures
Files
-
2d0e058a8b228d5218137814147c05674d5c5ad8d0614f80cd088dba156204e2.exe windows x86
730073214094cd328547bf1f72289752
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
user32
MessageBoxA
shell32
ShellExecuteW
msvcrt
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE