Static task
static1
Behavioral task
behavioral1
Sample
2b311e560f4bc151789837bd29f3662e92d2bd9256b981eaed152e6d335d0b62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b311e560f4bc151789837bd29f3662e92d2bd9256b981eaed152e6d335d0b62.exe
Resource
win10v2004-20220812-en
General
-
Target
2b311e560f4bc151789837bd29f3662e92d2bd9256b981eaed152e6d335d0b62
-
Size
799KB
-
MD5
34dfcd80a0683620aa5745a3eb624786
-
SHA1
c841c4e2c08505ba231cd498ef26a1c8700588e1
-
SHA256
2b311e560f4bc151789837bd29f3662e92d2bd9256b981eaed152e6d335d0b62
-
SHA512
debacebb1c03ff99049fd6f935f31a0093a520359227eb652a78a50f172c00bf219e6530f72d128e91b66071b54596329626e66b743007d6e63ab645264b2285
-
SSDEEP
24576:lkzU+zK5uLVRZyxozPGZtBQ1ZWDRSu7bDsV:lkYp5QeSEQ1ZWlDvDs
Malware Config
Signatures
Files
-
2b311e560f4bc151789837bd29f3662e92d2bd9256b981eaed152e6d335d0b62.exe windows x86
40138fce0cbd743ff2520d130d02371b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteFileA
SetLocalTime
GetCommandLineA
CreatePipe
ReadConsoleW
CreateDirectoryA
GetFileAttributesA
GetPriorityClass
GetModuleHandleA
HeapSize
WriteFile
SuspendThread
ResumeThread
VirtualProtect
GlobalSize
GetStdHandle
IsBadReadPtr
GetProcessHeap
GetLocaleInfoA
ResumeThread
GetDriveTypeA
user32
GetWindowLongA
DrawIcon
LoadCursorA
SetRect
DestroyMenu
SetFocus
GetMessageA
wsprintfA
GetWindowTextW
DispatchMessageA
PeekMessageA
GetWindowLongA
SetCursor
els
DllRegisterServer
DllGetClassObject
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE