Static task
static1
Behavioral task
behavioral1
Sample
2c682683c477f027811e3d6a405f80653f221ba97ef8a5fa4ffd453745bb9dd5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2c682683c477f027811e3d6a405f80653f221ba97ef8a5fa4ffd453745bb9dd5.exe
Resource
win10v2004-20220812-en
General
-
Target
2c682683c477f027811e3d6a405f80653f221ba97ef8a5fa4ffd453745bb9dd5
-
Size
203KB
-
MD5
92b66fe6df04b5bea617abcf585cc824
-
SHA1
f9ad6dc98cf6c113fc7831cf820f50b645f0c4f8
-
SHA256
2c682683c477f027811e3d6a405f80653f221ba97ef8a5fa4ffd453745bb9dd5
-
SHA512
0c6321d222905510324eaec5c5bbc4416b1cd37d57db12f441c1216eedb30b5006ae4bc53e0f14d593055d530614fd228ca0147e8c2a959a2efcc86efa3d631c
-
SSDEEP
3072:EQyEcSKtW+WmZjJ7lMw1ZPT5xrEa8gE2557V/Z0GcxvBltJ5jmSXHCHN4YiRv/:EEng/d7lMw1Z1xqgVBUdJVyHqVV
Malware Config
Signatures
Files
-
2c682683c477f027811e3d6a405f80653f221ba97ef8a5fa4ffd453745bb9dd5.exe windows x86
bc78b44de91cb419e78ac0b1b9d852b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
GetDesktopWindow
CharNextA
GetSystemMetrics
kernel32
lstrlenW
GetCommandLineA
lstrlenA
GetACP
GetStartupInfoA
GetDriveTypeA
lstrcmpA
GetProcessHeap
GlobalFindAtomW
CopyFileA
GetLastError
GetWindowsDirectoryA
GetCurrentThread
DeleteFileW
IsDebuggerPresent
Sleep
GetThreadLocale
VirtualAlloc
lstrcmpiW
SetCurrentDirectoryA
LoadLibraryW
GetUserDefaultLangID
GetConsoleOutputCP
GetModuleHandleA
SetLastError
GetTickCount
DeleteFileA
GetModuleHandleW
GetCurrentThreadId
lstrcmpiA
GetCurrentProcess
GetVersion
GetOEMCP
MulDiv
GetCurrentProcessId
GlobalFindAtomA
RemoveDirectoryA
GetCommandLineW
QueryPerformanceCounter
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ