Static task
static1
Behavioral task
behavioral1
Sample
2467802d1d434607275533fff2ab53198ef3a639a56972ab44e361907c90412c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2467802d1d434607275533fff2ab53198ef3a639a56972ab44e361907c90412c.exe
Resource
win10v2004-20220812-en
General
-
Target
2467802d1d434607275533fff2ab53198ef3a639a56972ab44e361907c90412c
-
Size
312KB
-
MD5
0b91616c72963272507ae1abeaac3e81
-
SHA1
ed86be49b9bcb8cac169c88f8e7aba1190f9a579
-
SHA256
2467802d1d434607275533fff2ab53198ef3a639a56972ab44e361907c90412c
-
SHA512
02cbd4932efd2360c66dc72eff978d4c6f8fce087042e8222c659afdc1743e0296313125c0f1710c266b568b09ee1bacae5516a6f0a905cb07828ebf288a9ec6
-
SSDEEP
6144:z/A1QcG2v00kZnecTvB/fHuRIZLfMjN/C4dsg/KqIfJAp:bA+p2v05pptVEBQ
Malware Config
Signatures
Files
-
2467802d1d434607275533fff2ab53198ef3a639a56972ab44e361907c90412c.exe windows x86
fe3f10b753ac8be0cc50c54421c2fa7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
HeapCreate
ExitProcess
TlsAlloc
TlsGetValue
GetCommandLineW
GetCurrentThread
GetLocaleInfoW
GetSystemTimeAsFileTime
InterlockedExchange
GetProcAddress
FreeEnvironmentStringsW
ReadFile
InitializeCriticalSection
FreeEnvironmentStringsA
CloseHandle
VirtualProtect
SetStdHandle
GetStartupInfoW
RtlUnwind
EnterCriticalSection
EnumSystemLocalesA
GetStringTypeW
LCMapStringW
CompareStringW
HeapAlloc
GetStringTypeA
GetTickCount
VirtualAlloc
WriteFile
GetLocaleInfoA
TlsSetValue
GetCPInfo
FoldStringA
WideCharToMultiByte
OpenMutexA
GetTimeFormatA
FlushFileBuffers
GetCurrentProcessId
GetCurrentProcess
SetLastError
EnumTimeFormatsW
QueryPerformanceCounter
TerminateProcess
MultiByteToWideChar
UnhandledExceptionFilter
GetStartupInfoA
CreateMutexA
HeapReAlloc
HeapSize
LeaveCriticalSection
GetFileType
GetCurrentThreadId
IsValidLocale
GetModuleFileNameA
LoadLibraryA
GetEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
GetOEMCP
HeapDestroy
GetPrivateProfileSectionW
WaitNamedPipeW
SetLocalTime
IsValidCodePage
SetConsoleMode
WriteProfileSectionA
CompareStringA
GetTimeZoneInformation
LCMapStringA
GetACP
GetDateFormatA
GetLocalTime
SetFilePointer
GetSystemInfo
SetHandleCount
GetUserDefaultLCID
GetCommandLineA
SetEnvironmentVariableA
GetLastError
IsBadWritePtr
GetProfileSectionW
VirtualFree
VirtualQuery
GetVersionExA
DeleteCriticalSection
GetEnvironmentStrings
HeapFree
TlsFree
advapi32
CreateServiceW
CryptDestroyKey
RegQueryValueA
RegEnumKeyW
CryptDeriveKey
CryptEnumProviderTypesA
CryptVerifySignatureW
RegOpenKeyExW
CryptGenKey
RegEnumKeyA
comctl32
InitCommonControlsEx
user32
EndPaint
EnumDesktopsA
GetDlgItem
DlgDirListComboBoxA
SetWindowsHookExA
CallMsgFilterA
ToAsciiEx
SetMenuContextHelpId
RegisterClassA
SetPropW
DdeKeepStringHandle
GetShellWindow
OffsetRect
UnloadKeyboardLayout
GetDesktopWindow
TranslateAcceleratorA
SetMenuItemInfoW
RegisterClassExA
GetDoubleClickTime
GetKeyboardType
gdi32
CreateMetaFileW
FloodFill
GetRandomRgn
EnumObjects
GetEnhMetaFileDescriptionA
GetTextColor
Polyline
GetTextExtentPoint32W
PtInRegion
EndDoc
GetMetaFileBitsEx
StrokeAndFillPath
Polygon
SetBkMode
CreateDIBPatternBrushPt
CreatePatternBrush
GetStretchBltMode
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ