Static task
static1
Behavioral task
behavioral1
Sample
2ef893252a609304bc24ed22cfc406de567fb6f42c3a98abd0f9f863b84cedb0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2ef893252a609304bc24ed22cfc406de567fb6f42c3a98abd0f9f863b84cedb0.exe
Resource
win10v2004-20220901-en
General
-
Target
2ef893252a609304bc24ed22cfc406de567fb6f42c3a98abd0f9f863b84cedb0
-
Size
26KB
-
MD5
92f0a347aa39d72916934db31dcb6520
-
SHA1
256a0a5ede667403de029da5dfcf2f1a27b9cbf6
-
SHA256
2ef893252a609304bc24ed22cfc406de567fb6f42c3a98abd0f9f863b84cedb0
-
SHA512
f9de533dd46075b9f4af73c7f4c1f5fe55f02699fadc0641efe793202ea643ec8caf2d81ffa5da1b38743bbbc3dde64fc2a4516dd10d04ce9705d4a77335418f
-
SSDEEP
768:3RLBL2oa53i5DIFeTN2kwn7i3f/PDgvrRL:35BLExY7TNFUe3f/PDgvrRL
Malware Config
Signatures
Files
-
2ef893252a609304bc24ed22cfc406de567fb6f42c3a98abd0f9f863b84cedb0.exe windows x86
89f7be235309801748369019347ea630
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
CreateNamedPipeA
GetVersionExA
GetNumberOfConsoleFonts
RtlMoveMemory
GetThreadTimes
GetProcessIoCounters
DeviceIoControl
GetProcessVersion
GetPrivateProfileSectionA
EnumUILanguagesA
SetupComm
ReadFileEx
IsSystemResumeAutomatic
VirtualAlloc
MoveFileA
GetModuleHandleA
GetLastError
WriteProfileSectionA
ChangeTimerQueueTimer
GetProcessHeap
OpenEventA
GetSystemWindowsDirectoryA
advapi32
CredMarshalCredentialW
CredUnmarshalCredentialA
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ