Static task
static1
Behavioral task
behavioral1
Sample
2d6840bc55d69aed78514503f1ef9a02e502434acff6d190cb0299d387efb51f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d6840bc55d69aed78514503f1ef9a02e502434acff6d190cb0299d387efb51f.exe
Resource
win10v2004-20220901-en
General
-
Target
2d6840bc55d69aed78514503f1ef9a02e502434acff6d190cb0299d387efb51f
-
Size
119KB
-
MD5
6538984277f937028e0f5cf37a85303f
-
SHA1
adad27b7a26c7b8cc7c19447fc7fc5fa7704c872
-
SHA256
2d6840bc55d69aed78514503f1ef9a02e502434acff6d190cb0299d387efb51f
-
SHA512
bf422bf5bc354151d51911f823523907d417e35d184a3a2614455957907741870ba3c3e00fa317524d08c7ef53c917ffc04d673b9060973eb90c63a380e36d3d
-
SSDEEP
3072:i//B6VbQXX3XItodU6g0x/uu0hoQcoS8l+Cb:i//gVWnPdUuwkoS8l+Cb
Malware Config
Signatures
Files
-
2d6840bc55d69aed78514503f1ef9a02e502434acff6d190cb0299d387efb51f.exe windows x86
be2d55c19ddedf9708ad0c9a85196ff9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetCurrentHwProfileA
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
BeginUpdateResourceA
CloseHandle
CopyFileA
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
EndUpdateResourceA
ExitProcess
ExitThread
FindAtomA
FindResourceA
FreeLibrary
FreeResource
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetThreadContext
GetTickCount
GetVolumeInformationA
GetWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadResource
LockResource
Module32First
Module32Next
OpenProcess
Process32First
Process32Next
ReadFile
ReadProcessMemory
ReleaseSemaphore
ResumeThread
SetEvent
SetFilePointer
SetLastError
SetThreadContext
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UpdateResourceA
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WinExec
WriteFile
WriteProcessMemory
msvcrt
_itoa
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
ctime
exit
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memchr
memcpy
memmove
printf
putchar
remove
signal
sprintf
strcat
strchr
strcmp
strcpy
strerror
strncpy
strstr
system
time
shell32
SHGetSpecialFolderPathA
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyState
GetKeyboardState
GetLastInputInfo
GetMessageA
GetWindowTextA
MapVirtualKeyA
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
inet_addr
inet_ntoa
recv
send
socket
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 23KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ