Static task
static1
Behavioral task
behavioral1
Sample
2420388692c9760705a0c122594e87e73ff6abddb8e864a4dd99f98c60975e79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2420388692c9760705a0c122594e87e73ff6abddb8e864a4dd99f98c60975e79.exe
Resource
win10v2004-20220812-en
General
-
Target
2420388692c9760705a0c122594e87e73ff6abddb8e864a4dd99f98c60975e79
-
Size
48KB
-
MD5
03cbea409814e56c7023fe94e047a450
-
SHA1
bf0918ef78562b666085153a8857328ed457f993
-
SHA256
2420388692c9760705a0c122594e87e73ff6abddb8e864a4dd99f98c60975e79
-
SHA512
d175d4ea7949bd5d18b34dabac909a5b513fc541c4143d44055fbb64b37da8f950f8820a703dfca6570617e2ea05333c51cd195194936f3127a38278c43aefcc
-
SSDEEP
768:ZKm0FKdvpjTJiHOyXcdCubTWMYInsqdzFpoGmQbSdhC8BcvJ8PnBRL2M6IuXEulL:MmbvRTJiHjcd5bT1jTzFpBbX8B88/7lO
Malware Config
Signatures
Files
-
2420388692c9760705a0c122594e87e73ff6abddb8e864a4dd99f98c60975e79.exe windows x86
99f0922107666544b27935aad2ad1f42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
kernel32
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCurrentThread
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
GetCurrentProcess
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
RaiseException
CreateNamedPipeA
CreateFileA
GetLastError
AllocConsole
OutputDebugStringA
WriteFile
ExitProcess
InterlockedDecrement
ReadFile
GetCurrentProcessId
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
dbgeng
DebugCreate
DebugConnect
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE