Static task
static1
Behavioral task
behavioral1
Sample
2a58428bc0008495c0961769770b20b6dcb06e9be2362d0f583a50efd223f0a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a58428bc0008495c0961769770b20b6dcb06e9be2362d0f583a50efd223f0a0.exe
Resource
win10v2004-20220812-en
General
-
Target
2a58428bc0008495c0961769770b20b6dcb06e9be2362d0f583a50efd223f0a0
-
Size
652KB
-
MD5
4cfedae45ae1fd619a076fc62f0317f7
-
SHA1
cfae4d0b3298ca9ef224e62c6e394fd9d45b23dc
-
SHA256
2a58428bc0008495c0961769770b20b6dcb06e9be2362d0f583a50efd223f0a0
-
SHA512
1aa00153481e68de4c7e6893d609ed1c8c81c4aad81bb04167a7469a51eb90013e608577e6f59be469985ed908b55d8dd72dad0eb0d313c39e62b2794ddb1317
-
SSDEEP
12288:TM8911jYqmlXKyT91v75+cdx571lanTN4g/umJbPdGo6/OFJzD1QMeN:TM8915YdlXnT7QWx577qJbPdb6/OFJz
Malware Config
Signatures
Files
-
2a58428bc0008495c0961769770b20b6dcb06e9be2362d0f583a50efd223f0a0.exe windows x86
7c3fc172f2910fc94faaab5d7089bf39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
VirtualQuery
GetComputerNameA
UnhandledExceptionFilter
GetLongPathNameA
GetProcessAffinityMask
GetModuleHandleA
GetStringTypeW
EnterCriticalSection
InterlockedExchange
GetProcAddress
SetLocaleInfoA
LCMapStringW
TlsSetValue
GlobalUnfix
SetWaitableTimer
GetNumberFormatA
RtlUnwind
GlobalUnlock
GetTempPathW
FoldStringW
FindNextFileW
GetDiskFreeSpaceW
SetComputerNameW
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GlobalFlags
OpenEventA
IsBadWritePtr
GetCurrentThreadId
lstrlenA
LockFileEx
WritePrivateProfileStringW
GetFullPathNameA
GetLastError
GetSystemTime
FindFirstFileW
InterlockedDecrement
EnumResourceTypesW
CompareStringA
WriteConsoleOutputW
MoveFileW
GetStringTypeExW
GetCurrentThread
MultiByteToWideChar
LocalFileTimeToFileTime
VirtualUnlock
GetOEMCP
GetCalendarInfoW
ContinueDebugEvent
ReadConsoleOutputA
HeapAlloc
GetCurrentProcessId
FlushFileBuffers
GetStdHandle
ReleaseMutex
LCMapStringA
OpenMutexA
FreeLibraryAndExitThread
SetLocalTime
GetConsoleCursorInfo
HeapReAlloc
RaiseException
GetComputerNameW
InterlockedIncrement
LeaveCriticalSection
GetPrivateProfileStructW
GetEnvironmentStringsW
GetModuleFileNameA
GetPrivateProfileSectionW
GetTickCount
GetACP
SetPriorityClass
SetLastError
TlsFree
ReadConsoleW
HeapCreate
CloseHandle
CreateDirectoryExW
UnmapViewOfFile
HeapFree
GetConsoleOutputCP
GetCurrentDirectoryA
AddAtomW
OutputDebugStringA
GetVolumeInformationA
SetFilePointer
GetCurrencyFormatW
GetLocalTime
SetConsoleWindowInfo
FindClose
InitializeCriticalSection
SetHandleCount
WriteFile
VirtualAlloc
CreateMutexA
GetEnvironmentStringsA
DeleteCriticalSection
GlobalGetAtomNameW
GetSystemDefaultLangID
VirtualFree
LoadResource
FreeEnvironmentStringsA
EnumTimeFormatsW
GetStartupInfoA
CreateToolhelp32Snapshot
TlsAlloc
GetCommandLineA
GetCurrentProcess
SetConsoleCP
QueryPerformanceCounter
GetFileType
InterlockedCompareExchange
GetTempFileNameA
GetPrivateProfileStructA
GetTimeZoneInformation
WideCharToMultiByte
TerminateProcess
ReadFile
GetStringTypeA
ExitProcess
FillConsoleOutputCharacterA
WriteConsoleInputW
GetVersion
HeapLock
CreateMailslotW
TlsGetValue
FindAtomW
SetStdHandle
ConnectNamedPipe
MoveFileA
WaitForMultipleObjectsEx
SetEnvironmentVariableA
GetCPInfo
SetCurrentDirectoryW
GetEnvironmentStrings
CompareStringW
LoadLibraryA
HeapDestroy
GetThreadPriorityBoost
user32
CharUpperBuffA
SetWinEventHook
GetOpenClipboardWindow
ToUnicode
BroadcastSystemMessageW
TrackPopupMenuEx
ShowWindow
SetUserObjectInformationA
AnyPopup
GetGUIThreadInfo
DdeAddData
DrawFrame
EnumDisplayMonitors
SetMenuItemBitmaps
CreateWindowExA
CheckMenuRadioItem
RegisterClassA
RegisterClassExA
ChangeMenuA
LoadIconA
RegisterWindowMessageA
PeekMessageA
DefWindowProcW
BringWindowToTop
MessageBoxW
ChangeMenuW
ReleaseCapture
GetCursorInfo
CallMsgFilter
DestroyWindow
comctl32
ImageList_GetIcon
ImageList_EndDrag
CreateMappedBitmap
ImageList_DragEnter
ImageList_Create
ImageList_Remove
InitCommonControlsEx
Sections
.text Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ