Static task
static1
Behavioral task
behavioral1
Sample
2fccb7db76920430bd531d138273591fd3674cb7d28cda0d74ff774edb5899a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2fccb7db76920430bd531d138273591fd3674cb7d28cda0d74ff774edb5899a5.exe
Resource
win10v2004-20220812-en
General
-
Target
2fccb7db76920430bd531d138273591fd3674cb7d28cda0d74ff774edb5899a5
-
Size
36KB
-
MD5
312251cffd132956fc76a2d3943133d0
-
SHA1
d3403b03d615f1d2328a6c19899608375901979e
-
SHA256
2fccb7db76920430bd531d138273591fd3674cb7d28cda0d74ff774edb5899a5
-
SHA512
eb743054a5fbd5d0acbbdaeb000c6d6fb713e98da80898dbc495002fba6aef2377cbafc77e0eb796dc79d63ae7dd27169e9634076bd40a6761a7cadc65229285
-
SSDEEP
768:t632cWByJwF/sC55/9/3dJC2N6LTucP0FSOREHjpNcb5D7dX8:t6V5C75FJp6LTuu6ScEHj3e5D7h8
Malware Config
Signatures
Files
-
2fccb7db76920430bd531d138273591fd3674cb7d28cda0d74ff774edb5899a5.exe windows x86
042d0fea2e92059b2a53ee91960ce9d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
RegisterClassExA
TranslateMessage
LoadIconA
LoadStringA
DispatchMessageA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
SetFocus
DestroyWindow
SendMessageA
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
LoadCursorA
UpdateWindow
kernel32
ExitProcess
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetProcessHeap
lstrcpynA
LoadLibraryA
CreateDirectoryA
WriteProcessMemory
GetModuleHandleA
comctl32
ord17
wtsapi32
WTSEnumerateProcessesA
WTSLogoffSession
WTSQuerySessionInformationA
WTSWaitSystemEvent
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ