Static task
static1
Behavioral task
behavioral1
Sample
2c65bdaf07edc932eae7bd911d1081d5e31201ee98c28cf1cdeee3cb6d561a88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c65bdaf07edc932eae7bd911d1081d5e31201ee98c28cf1cdeee3cb6d561a88.exe
Resource
win10v2004-20220812-en
General
-
Target
2c65bdaf07edc932eae7bd911d1081d5e31201ee98c28cf1cdeee3cb6d561a88
-
Size
799KB
-
MD5
939abfde8750d2b83b6b0df7955c4d50
-
SHA1
4e0666591b3417c0580028ccf85bb36ec2cd695d
-
SHA256
2c65bdaf07edc932eae7bd911d1081d5e31201ee98c28cf1cdeee3cb6d561a88
-
SHA512
2dfdfbc481b9c4d164fb96a8751198f53792fb2aa8e6cbe26b69d6f3fbdbccf3ecf4c9682e649274d94ca9051af81356c9823b8334595a9d6a2ac6f0c8f2b9cd
-
SSDEEP
24576:QyK8Gfe+FkGE+9o008hQe/D/7/h30ldwhmvDc+/waRHPR8gt:VEe+46F0vaD/7/h30l1v4UR588
Malware Config
Signatures
Files
-
2c65bdaf07edc932eae7bd911d1081d5e31201ee98c28cf1cdeee3cb6d561a88.exe windows x86
b194738e81372e656d6bc1bf4ee18dbb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
GetLocaleInfoA
GetStdHandle
GetProcessHeap
CreateDirectoryA
IsBadReadPtr
GetDriveTypeA
ReadConsoleW
ResumeThread
WriteFile
DeleteFileA
GetFileAttributesA
CreatePipe
GetPriorityClass
GetModuleHandleA
SetLocalTime
VirtualProtect
HeapSize
GetCommandLineA
GlobalSize
SuspendThread
user32
GetMessageA
GetWindowTextW
GetWindowLongA
SetCursor
DrawIcon
GetWindowLongA
LoadCursorA
DispatchMessageA
SetRect
DestroyMenu
DestroyIcon
PeekMessageA
wsprintfA
els
DllGetClassObject
DllRegisterServer
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE