Static task
static1
Behavioral task
behavioral1
Sample
2070d149cc91f4acd8472b62f7515853368c32c6f9e322b743a001268b637d0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2070d149cc91f4acd8472b62f7515853368c32c6f9e322b743a001268b637d0d.exe
Resource
win10v2004-20220812-en
General
-
Target
2070d149cc91f4acd8472b62f7515853368c32c6f9e322b743a001268b637d0d
-
Size
958KB
-
MD5
811a4dabcf796d91c725615a5e57e200
-
SHA1
15f34f3731823e918a3666f064d843146941b6dd
-
SHA256
2070d149cc91f4acd8472b62f7515853368c32c6f9e322b743a001268b637d0d
-
SHA512
e81bf92f28b776419cd804b78a489cefd7259de7836a1e307c83286986ca035b909da3cb6d8f8da555d95ce614e8ff62fc6d96a4feb7f7d94d47a7f25cee5cb6
-
SSDEEP
24576:OQlJ4ejxR8bA6B0TiI4F6GueRoWPxRBhEjkh5w5:Oe338lIE6GhCWpRr
Malware Config
Signatures
Files
-
2070d149cc91f4acd8472b62f7515853368c32c6f9e322b743a001268b637d0d.exe windows x86
d6ab82f092813f3e1e574f4cbbcfcb44
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetShortPathNameW
GlobalGetAtomNameW
SetThreadIdealProcessor
WaitForMultipleObjectsEx
BackupRead
IsDBCSLeadByte
MoveFileExW
GetCommProperties
FindFirstFileW
ConnectNamedPipe
GetDriveTypeW
GetComputerNameExW
GlobalAlloc
LocalFree
AssignProcessToJobObject
ExitProcess
FindFirstVolumeMountPointW
SetTapeParameters
GetCurrentProcessId
WaitCommEvent
WritePrivateProfileStringA
GetNamedPipeHandleStateW
GetProfileIntW
IsBadCodePtr
GetPrivateProfileSectionNamesA
WaitForMultipleObjects
GlobalFlags
_lopen
_lread
DisconnectNamedPipe
lstrlenA
FindAtomA
GetStartupInfoW
FindFirstFileA
FindResourceA
RtlUnwind
FreeUserPhysicalPages
SetVolumeLabelW
GetLongPathNameA
GetLogicalDriveStringsW
IsBadWritePtr
GetSystemDefaultUILanguage
FreeEnvironmentStringsA
CancelWaitableTimer
EnumSystemLanguageGroupsA
lstrcmpiA
OutputDebugStringW
SetLastError
DefineDosDeviceW
LCMapStringW
HeapAlloc
GetVolumeNameForVolumeMountPointW
shell32
Shell_NotifyIconA
ShellAboutA
SHFreeNameMappings
ExtractAssociatedIconA
ExtractAssociatedIconExA
SHGetSpecialFolderPathA
DoEnvironmentSubstA
DuplicateIcon
user32
DestroyCaret
CountClipboardFormats
SetMenuItemBitmaps
ReplyMessage
GetClassInfoExA
MonitorFromRect
GetClientRect
ChildWindowFromPoint
GetWindowRgn
GetClassInfoExW
ClientToScreen
DdeCreateStringHandleA
GetDCEx
EmptyClipboard
BroadcastSystemMessageA
OemToCharBuffA
GetMessagePos
SetSysColors
SetMenuInfo
ChangeClipboardChain
EnumPropsW
ModifyMenuA
CharUpperBuffA
HideCaret
VkKeyScanExA
OpenWindowStationA
SetForegroundWindow
GetAsyncKeyState
SetCursor
DdeEnableCallback
DestroyIcon
SetCaretPos
GetDoubleClickTime
CopyAcceleratorTableA
DragObject
ScrollDC
EnumDesktopsW
GetMenuState
CharPrevW
AppendMenuW
BringWindowToTop
LoadCursorA
MonitorFromWindow
ShowWindowAsync
MapVirtualKeyA
GetInputState
IMPGetIMEW
DdeCreateStringHandleW
CharUpperBuffW
EnumPropsA
GetPropW
GetGUIThreadInfo
PostMessageW
DrawTextA
GetWindowTextLengthA
ValidateRect
DlgDirListComboBoxA
DdeSetUserHandle
RegisterClipboardFormatA
WindowFromDC
Sections
.text Size: 323KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ