Static task
static1
Behavioral task
behavioral1
Sample
2e892c73832183f3e4cc13f054aad2f092330dcf2d9fccdd7422d8bbea90ecc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e892c73832183f3e4cc13f054aad2f092330dcf2d9fccdd7422d8bbea90ecc4.exe
Resource
win10v2004-20220812-en
General
-
Target
2e892c73832183f3e4cc13f054aad2f092330dcf2d9fccdd7422d8bbea90ecc4
-
Size
210KB
-
MD5
a2091ccd61da70b9f3e3237ad4550070
-
SHA1
8d57a37f71faf65e73836ab7d23528d571a050ab
-
SHA256
2e892c73832183f3e4cc13f054aad2f092330dcf2d9fccdd7422d8bbea90ecc4
-
SHA512
b4cc9359bf02270e6b42c82b3af38651dca85b75d0bcf15bb990e25f8baedaf82382a9b1deb34b6c8b02d9b1665e6d746f2da47a021865914cb729af1ac76438
-
SSDEEP
6144:wLB7OocMwtb7tyrL4YHeLCE2+CFZciZwMn/6DYA/B:u7cMwrEkXL12+BiZwMnEZJ
Malware Config
Signatures
Files
-
2e892c73832183f3e4cc13f054aad2f092330dcf2d9fccdd7422d8bbea90ecc4.exe windows x86
8db7bc94de695b0171eb505f5e387725
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetEnvironmentStrings
GlobalAlloc
GetThreadLocale
InterlockedCompareExchange
GetTempPathA
FileTimeToSystemTime
DeleteFileA
CompareStringA
GetEnvironmentStringsW
SetCurrentDirectoryA
GetCurrentProcessId
SetEnvironmentVariableA
FileTimeToDosDateTime
SetFileAttributesA
GetFileAttributesW
MoveFileA
RemoveDirectoryA
GetLocalTime
LoadLibraryW
VirtualProtect
GetEnvironmentVariableA
GetCPInfo
WritePrivateProfileStringA
GetCurrentThreadId
InterlockedDecrement
FileTimeToLocalFileTime
GetShortPathNameA
CopyFileA
IsDebuggerPresent
lstrcmpiA
ExpandEnvironmentStringsA
GetSystemInfo
Sleep
GetModuleHandleW
IsValidCodePage
GetStringTypeW
GetWindowsDirectoryA
GetStartupInfoA
GetOEMCP
GetUserDefaultLangID
LoadResource
SetStdHandle
GetSystemDirectoryA
GetDriveTypeA
EnumCalendarInfoA
GetExitCodeProcess
msvcrt
__set_app_type
__p__fmode
_except_handler3
__getmainargs
__p__commode
_controlfp
__p___initenv
__setusermatherr
_initterm
_exit
_adjust_fdiv
_XcptFilter
advapi32
LookupPrivilegeValueW
InitializeAcl
RegQueryValueExA
RegOpenKeyExA
RegEnumValueW
OpenSCManagerA
RegDeleteValueA
RegEnumKeyW
RegQueryValueA
RegEnumKeyA
RegOpenKeyW
SetSecurityDescriptorGroup
RegEnumKeyExW
CheckTokenMembership
GetLengthSid
OpenServiceA
DeleteService
CloseServiceHandle
OpenSCManagerW
RegEnumKeyExA
SetSecurityDescriptorDacl
QueryServiceStatus
IsValidSid
GetTokenInformation
RegSetValueExA
SetSecurityDescriptorOwner
InitiateSystemShutdownA
CryptGenRandom
RevertToSelf
user32
IsDialogMessageA
LoadStringA
GetFocus
GetCapture
DestroyMenu
CreatePopupMenu
GetMenuItemCount
CreateWindowExA
GetIconInfo
DestroyIcon
SetPropA
GetWindowPlacement
EnableMenuItem
CheckMenuItem
BeginPaint
MessageBeep
SetCursor
LoadBitmapA
ScrollWindow
GetMessageA
SetActiveWindow
OemToCharA
MessageBoxA
GetMenu
SetTimer
ReleaseCapture
UpdateWindow
ReleaseDC
DispatchMessageA
OpenClipboard
CloseClipboard
SetScrollInfo
DeleteMenu
GetWindowLongA
GetPropA
GetWindowRect
GetScrollInfo
GetClassNameA
InsertMenuItemA
LoadIconA
GetWindowThreadProcessId
GetDesktopWindow
GetDlgItem
EnumWindows
DrawEdge
IsWindowEnabled
GetScrollRange
EmptyClipboard
Sections
.text Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ