Static task
static1
Behavioral task
behavioral1
Sample
2b6d887afc44b51759407fa06bfb5f75d8e7a49dfbab6f49fe0d94458ceb6236.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b6d887afc44b51759407fa06bfb5f75d8e7a49dfbab6f49fe0d94458ceb6236.exe
Resource
win10v2004-20220901-en
General
-
Target
2b6d887afc44b51759407fa06bfb5f75d8e7a49dfbab6f49fe0d94458ceb6236
-
Size
149KB
-
MD5
809851d7e29da6c41b0eb8feb66ad440
-
SHA1
2286b22ecb908d0b5b17e858c1cdf0c0f223a60f
-
SHA256
2b6d887afc44b51759407fa06bfb5f75d8e7a49dfbab6f49fe0d94458ceb6236
-
SHA512
85c668b4c28f2873792983a996f53897b33d01864073dd57d61283a843f51c6592c529df0042559aa1458d34d62a6089cef875a3a00a92dc69e2d60160f123bf
-
SSDEEP
3072:56Wk0WLMMUAyDDUYNAdcSKTtlgc/qeY6K7P6k7R5nwzT1nN:4aWLMMUAyDhMs7gcCeY6Q1F21N
Malware Config
Signatures
Files
-
2b6d887afc44b51759407fa06bfb5f75d8e7a49dfbab6f49fe0d94458ceb6236.exe windows x86
5e286dea4916a9d90e306a7728f3e720
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
_except_handler3
_controlfp
__p__commode
__set_app_type
_XcptFilter
__getmainargs
_adjust_fdiv
__setusermatherr
_exit
_initterm
__p___initenv
user32
SetFocus
GetClientRect
MapWindowPoints
SetTimer
CharNextA
EnableWindow
DefWindowProcA
GetKeyState
TrackPopupMenu
EndPaint
InvalidateRect
LoadStringA
KillTimer
SetForegroundWindow
GetClassInfoA
SetWindowTextA
CallNextHookEx
ScreenToClient
SystemParametersInfoA
GetDC
RegisterClassA
GetSysColor
BeginPaint
GetCursorPos
GetMenuItemCount
GetDlgItem
ShowWindow
SendMessageA
GetSubMenu
GetMenu
GetWindowLongA
MessageBoxA
GetWindowTextA
wsprintfA
GetWindow
DispatchMessageA
IsWindowEnabled
kernel32
GetStringTypeA
LocalAlloc
SetLastError
LCMapStringA
GetProcAddress
InterlockedExchange
VirtualFree
GetCurrentThreadId
GetLocalTime
lstrcmpiW
MultiByteToWideChar
TerminateProcess
GetModuleHandleW
GetCommandLineA
VirtualProtect
GetFullPathNameA
GetCPInfo
LocalFree
GetFileType
GetSystemInfo
UnhandledExceptionFilter
GetStartupInfoA
QueryPerformanceCounter
GetDriveTypeA
GetThreadLocale
GetModuleHandleA
GetOEMCP
CopyFileA
GetEnvironmentStrings
SetErrorMode
GetCurrentProcessId
LoadLibraryA
SetFilePointer
Sleep
InterlockedIncrement
WaitForSingleObject
SetUnhandledExceptionFilter
GetConsoleOutputCP
GetLocaleInfoA
GetLastError
DeleteFileA
GetModuleFileNameW
lstrlenA
advapi32
OpenSCManagerA
RegQueryValueExA
CryptDestroyHash
SetSecurityDescriptorOwner
RegQueryValueA
CryptCreateHash
CryptAcquireContextA
LookupPrivilegeValueW
OpenServiceW
OpenProcessToken
RegFlushKey
LookupPrivilegeValueA
RegEnumKeyA
AdjustTokenPrivileges
CheckTokenMembership
RegOpenKeyW
RegEnumKeyExW
RegOpenKeyA
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyW
CopySid
GetUserNameA
QueryServiceStatus
RegQueryValueExW
CryptGenRandom
CryptHashData
Sections
.text Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ