Static task
static1
Behavioral task
behavioral1
Sample
2cd83827570e77b609380982328ae834ec4604a83747bed4f4cb426424ba54c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2cd83827570e77b609380982328ae834ec4604a83747bed4f4cb426424ba54c4.exe
Resource
win10v2004-20220812-en
General
-
Target
2cd83827570e77b609380982328ae834ec4604a83747bed4f4cb426424ba54c4
-
Size
140KB
-
MD5
0be3da668eb62bedc5696978e76acd52
-
SHA1
65ca9631868b21334fcee5103e4c9d97da2c7a88
-
SHA256
2cd83827570e77b609380982328ae834ec4604a83747bed4f4cb426424ba54c4
-
SHA512
4a802a2e075702c8f0395978ef65baeaaf5368497a3b51a1c4a4f8e88fc69463fda027de7c4cfb4c54e0f0c8867575e56670b1009a9ac3647aab777a96c9575b
-
SSDEEP
3072:X9cG66ScbWJe6iJahwKY/DWLImdJQDRWM/mQl:X9dNPz6JQDRU
Malware Config
Signatures
Files
-
2cd83827570e77b609380982328ae834ec4604a83747bed4f4cb426424ba54c4.exe windows x86
451a0c07ede1404d3ccac96aa78d87ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
OpenProcess
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
GetLocaleInfoA
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
GetLastError
ReleaseMutex
FormatMessageA
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
user32
PostQuitMessage
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowTextA
PostMessageA
SetTimer
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
FindWindowA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
Netbios
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ