Static task
static1
Behavioral task
behavioral1
Sample
2265b54081886cf5307b515a43b4fe42ed253b4929e59c2f8253832c0f96d192.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2265b54081886cf5307b515a43b4fe42ed253b4929e59c2f8253832c0f96d192.exe
Resource
win10v2004-20220812-en
General
-
Target
2265b54081886cf5307b515a43b4fe42ed253b4929e59c2f8253832c0f96d192
-
Size
157KB
-
MD5
51cb4ff6bd11461d18f48609d000112b
-
SHA1
d9c0754238995506852bd3ddc8eac1a1fd2045e9
-
SHA256
2265b54081886cf5307b515a43b4fe42ed253b4929e59c2f8253832c0f96d192
-
SHA512
c80746b625dbf82575813804ae2d988e14ce5ff74b701ddaf3cff5c6aaecdc8f3e74dbded9ecd2f6f7da2c57475d49275bc0e77b202f4b1f1efa93972e61065e
-
SSDEEP
3072:ZQpjOnQEyX2PzuZ1gChp7rdQ4mgy/knGrV9ZF4U8FLY4I:3yUuy473O8Fs4
Malware Config
Signatures
Files
-
2265b54081886cf5307b515a43b4fe42ed253b4929e59c2f8253832c0f96d192.exe windows x86
0bc121fe8d607e48699bf0ae2c3a66af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareFileTime
CompareStringA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateProcessW
CreateThread
DeleteFileW
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FindFirstFileW
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeResource
GetCommandLineW
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcessId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeThread
GetFileSize
GetFileType
GetFullPathNameA
GetLocaleInfoW
GetModuleHandleW
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemInfo
GetTempFileNameA
GetTempPathW
GetTimeZoneInformation
GetUserDefaultLangID
GetVersion
GetVersionExW
GlobalAlloc
GlobalReAlloc
HeapFree
HeapReAlloc
HeapSize
InterlockedIncrement
IsBadCodePtr
IsDebuggerPresent
IsValidCodePage
LCMapStringW
LoadLibraryA
LoadLibraryExW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
MoveFileA
OpenProcess
OutputDebugStringA
RemoveDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
SetHandleCount
SetStdHandle
SetThreadLocale
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsFree
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcmpiW
lstrcpynA
user32
AdjustWindowRectEx
BeginPaint
CallNextHookEx
CallWindowProcA
CharLowerA
CharNextA
CheckMenuItem
ClientToScreen
CreateMenu
DestroyWindow
DispatchMessageA
DrawFrameControl
DrawIcon
DrawTextA
EmptyClipboard
EnableMenuItem
EndDialog
EndPaint
EnumThreadWindows
EnumWindows
EqualRect
FindWindowA
GetActiveWindow
GetCapture
GetClientRect
GetDlgItem
GetForegroundWindow
GetKeyState
GetKeyboardType
GetMessageA
GetParent
GetPropA
GetScrollRange
GetSysColor
GetSystemMetrics
GetTopWindow
GetWindowDC
GetWindowThreadProcessId
InsertMenuA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsIconic
IsWindow
LoadBitmapA
LoadIconA
LoadStringA
MessageBoxA
OpenClipboard
PtInRect
RedrawWindow
RegisterClipboardFormatA
ReleaseCapture
RemovePropA
SendDlgItemMessageA
SendMessageA
SetForegroundWindow
SetMenu
SetPropA
SetScrollRange
SetWindowPlacement
SetWindowsHookExA
ShowWindow
TrackPopupMenu
UnhookWindowsHookEx
UpdateWindow
WaitMessage
WindowFromPoint
wsprintfA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE