Static task
static1
Behavioral task
behavioral1
Sample
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5_dump_0x00400000.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5_dump_0x00400000.exe
Resource
win10v2004-20220812-en
General
-
Target
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5.zip
-
Size
79KB
-
MD5
37b23b2a042fedd97ab0c1626a8e4f71
-
SHA1
94547126faabb70b3c9abd4f1f4f7a35fcc645fb
-
SHA256
aa386b289fb0437b477785143bfa8bd6eb83391ec6946fdefc4ba6a34572b65e
-
SHA512
4e17578c8b6b0b5ced7035cc0b46309faf7a533cec946c4199eb254d67c1306ed2a18578a0700b8ba233e9221180eea2cb9eb3e6c0f6df71e5febbd13891f218
-
SSDEEP
1536:66lrJq8dCtBhZfwjwGMQil4tCUm6CjNoV6XeaUmC+lBtWr7pjGZm6VU1rQ1:n3qICtBhVwp24hMjNI6XeyC+EJjul71
Malware Config
Signatures
Files
-
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5.zip.zip
Password: infected
-
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5.exe windows x86
Password: infected
3bf27b83e0c98731800c31d3281c474f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
ExitProcess
CopyFileA
DeleteFileA
CreateThread
lstrcmpiA
WaitForSingleObject
MoveFileA
GetFileSize
CreateFileA
WriteFile
GetLogicalDriveStringsA
GetShortPathNameA
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetCurrentThreadId
GetEnvironmentVariableA
GlobalAlloc
LoadLibraryExA
GlobalFree
DeviceIoControl
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
ReadFile
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
GlobalMemoryStatus
user32
wsprintfA
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetDesktopWindow
SetCursorPos
keybd_event
ExitWindowsEx
mouse_event
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
ControlService
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_acmdln
puts
printf
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
free
sprintf
strncpy
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strcspn
strstr
??3@YAXPAX@Z
_ftol
fclose
fprintf
fopen
rand
memmove
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
ws2_32
WSAStartup
setsockopt
sendto
htonl
WSASocketA
htons
socket
closesocket
recv
shutdown
inet_addr
gethostbyname
send
connect
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
2b9127a4222e717466e5eb87787aa60166f185727f34257a7810f0e0a1c8b2e5_dump_0x00400000.exe windows x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ