Static task
static1
Behavioral task
behavioral1
Sample
2f9772d4fb020a252659f67713e43bca80e7651aa52de7562d46c690744b7bab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f9772d4fb020a252659f67713e43bca80e7651aa52de7562d46c690744b7bab.exe
Resource
win10v2004-20220812-en
General
-
Target
2f9772d4fb020a252659f67713e43bca80e7651aa52de7562d46c690744b7bab
-
Size
172KB
-
MD5
91d8727312c2d51d0074f6bdf691d8e0
-
SHA1
084242ba13a1b8a5e8e077a3212953adfd263df2
-
SHA256
2f9772d4fb020a252659f67713e43bca80e7651aa52de7562d46c690744b7bab
-
SHA512
49cbb8e82bbfb0dc96a3f9e9e401275f538055c926c9d221235c2fd0a85b05188b812c1a531053befa088060336a12629dbc8e8f3fbc6616062b3fe942ded40d
-
SSDEEP
3072:MmvdpQHMn0aCW/27z9c9P1ESD7VgCyWcVyuEPJQ4nPobnptbmGg:zVaqsogz9udBFgpFVyhR3nPy+Gg
Malware Config
Signatures
Files
-
2f9772d4fb020a252659f67713e43bca80e7651aa52de7562d46c690744b7bab.exe windows x86
0115b418ef3cfd95c77f607ad28f27ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FindClose
LocalFree
LocalAlloc
GetFileSize
SetFilePointer
RemoveDirectoryA
InitializeCriticalSection
lstrcmpiA
ExitProcess
OpenProcess
GlobalFree
GlobalLock
GlobalAlloc
GetTickCount
GetStartupInfoA
GetCurrentThreadId
GetSystemInfo
OpenEventA
lstrlenA
SetStdHandle
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
lstrcmpA
CancelIo
InterlockedExchange
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetProcAddress
Sleep
CloseHandle
FreeLibrary
SetEvent
LoadLibraryA
WriteFile
GetFileType
RtlUnwind
RaiseException
HeapAlloc
HeapFree
CreateThread
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
user32
IsWindow
IsWindowVisible
ExitWindowsEx
GetCursorPos
GetDC
SetRect
GetSystemMetrics
CloseClipboard
SetClipboardData
SetCapture
SendMessageA
LoadCursorA
MessageBoxA
GetWindowTextA
CharNextA
wsprintfA
GetMessageA
TranslateMessage
DispatchMessageA
SetCursorPos
advapi32
OpenSCManagerA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
LookupAccountSidA
RegSetValueExA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegCloseKey
OpenEventLogA
ClearEventLogA
CloseEventLog
LsaFreeMemory
LsaOpenPolicy
LsaClose
IsValidSid
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ