Static task
static1
Behavioral task
behavioral1
Sample
2e8e282a7c1cc27e7a4d3467deb4ac8e1c1395320944140a379c38eb95213792.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e8e282a7c1cc27e7a4d3467deb4ac8e1c1395320944140a379c38eb95213792.exe
Resource
win10v2004-20220812-en
General
-
Target
2e8e282a7c1cc27e7a4d3467deb4ac8e1c1395320944140a379c38eb95213792
-
Size
251KB
-
MD5
5955ce25e35757d7608ade5278177f86
-
SHA1
6c25222cd19549692e276b3fa9d14880ada1089c
-
SHA256
2e8e282a7c1cc27e7a4d3467deb4ac8e1c1395320944140a379c38eb95213792
-
SHA512
0d646d3142c0fc725e973f6f3b3eab2c72c7c91ba8581c922c18e983c9cab4c296cfc78f43a13667f000d9f526957cb5a2b6838f330b60be2b748152f8a71578
-
SSDEEP
6144:Z7krdQXKsf0AAFoOMaGchbYv5Oarszo0naGh:Z7krSOMF/54PaGh
Malware Config
Signatures
Files
-
2e8e282a7c1cc27e7a4d3467deb4ac8e1c1395320944140a379c38eb95213792.exe windows x86
ac012bb61937da25e6c9f31d67554e7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
InterlockedExchange
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
RtlUnwind
RaiseException
VirtualAlloc
HeapSize
Sleep
ExitProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
SetEndOfFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
LCMapStringW
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
GetModuleHandleW
CompareStringA
GlobalGetAtomNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
SetErrorMode
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
lstrlenA
MultiByteToWideChar
OutputDebugStringA
SetEvent
UnmapViewOfFile
MapViewOfFile
CreateEventA
CreateFileMappingA
GetPrivateProfileStringA
GetVersionExA
GetTimeZoneInformation
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
DeleteFileA
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
FormatMessageA
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
GetModuleHandleA
GetCommandLineA
GetLastError
CloseHandle
WaitForSingleObject
CreateProcessA
SetFileAttributesA
lstrcatA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetProcAddress
LoadLibraryA
FindResourceA
LoadResource
LockResource
SizeofResource
LCMapStringA
WideCharToMultiByte
user32
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowTextA
ValidateRect
RegisterWindowMessageA
LoadIconA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
GetFocus
IsWindow
GetForegroundWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
GetSubMenu
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
GetCapture
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowTextA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
SendMessageA
GetParent
SetPropA
gdi32
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
SetWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ