Static task
static1
Behavioral task
behavioral1
Sample
2b7a5d41de73a99c600b0883f0fbdd5794cadb461c289607d777ec6d598f0a41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b7a5d41de73a99c600b0883f0fbdd5794cadb461c289607d777ec6d598f0a41.exe
Resource
win10v2004-20220901-en
General
-
Target
2b7a5d41de73a99c600b0883f0fbdd5794cadb461c289607d777ec6d598f0a41
-
Size
571KB
-
MD5
96de0a391e2a0e959f0bcb40501df046
-
SHA1
c2f3eaf14ffceba22080f4fa47a2aad7a11c6be7
-
SHA256
2b7a5d41de73a99c600b0883f0fbdd5794cadb461c289607d777ec6d598f0a41
-
SHA512
3609458f15fdc464cd0a69db20569553d68a55cf1e25f4f22eab5e031e306a8154e0844b784b72336b6c4c99437c222e6a4b5ea4a984b20a9fae67f2e3ecb7f4
-
SSDEEP
12288:KlOAvumHSbPpN/67WgzgZf2a+3+yFMWjPWygpieBnYyEKY5OXw+z+UlxGOixTZ0Q:QtiPr/67akD+JIuygprYrKY5Og+z+Ulj
Malware Config
Signatures
Files
-
2b7a5d41de73a99c600b0883f0fbdd5794cadb461c289607d777ec6d598f0a41.exe windows x86
7b9d9ea5ab544d6e599e32c9b3cb16e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
HeapCreate
LocalAlloc
GetCommandLineW
GetEnvironmentVariableW
CompareStringW
IsWow64Process
EncodePointer
DecodePointer
ExpandEnvironmentStringsW
GetVersionExA
HeapSize
HeapDestroy
GetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
LocalFree
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
msvcrt
_wcsicmp
iswctype
swscanf_s
_wtoi
wcstok
fclose
feof
fgetws
_wfopen
_wcsnicmp
memcpy
towlower
_vsnwprintf
??1type_info@@UAE@XZ
_vsnprintf
__p__fmode
__set_app_type
_purecall
?terminate@@YAXXZ
_except_handler4_common
_controlfp
_unlock
wcsrchr
??2@YAPAXI@Z
__CxxFrameHandler3
memset
free
??3@YAXPAX@Z
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
__dllonexit
_lock
_onexit
malloc
advapi32
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyW
shell32
ord165
CommandLineToArgvW
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
user32
UnregisterClassA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 496KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE