Static task
static1
Behavioral task
behavioral1
Sample
2c24db7f898be4690c6a93aa8361d5e8a1e07db26a04c2542e5dfb0862969ca0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c24db7f898be4690c6a93aa8361d5e8a1e07db26a04c2542e5dfb0862969ca0.exe
Resource
win10v2004-20220812-en
General
-
Target
2c24db7f898be4690c6a93aa8361d5e8a1e07db26a04c2542e5dfb0862969ca0
-
Size
88KB
-
MD5
05ca15a681e06a70bd4887158d392856
-
SHA1
c21b1e1636fd2e7985d82124d95f94dbf1c92d7f
-
SHA256
2c24db7f898be4690c6a93aa8361d5e8a1e07db26a04c2542e5dfb0862969ca0
-
SHA512
1bdae5f60de48a4cbeda07b6f1babcc6f8556b54eceb9947534ce5622b9e77e8835655337cb9469c074d592c5ce5a85013f781316f91f9930f415586002de295
-
SSDEEP
1536:zsy2mHRmsZiDwGg3S+DS+wcSaMf1H+ZkM0Qmz6EXN:zjXGgi+Dzwlau1H+ZkM7mz6EXN
Malware Config
Signatures
Files
-
2c24db7f898be4690c6a93aa8361d5e8a1e07db26a04c2542e5dfb0862969ca0.exe windows x86
75c43b9fc37a6c407eae6d31209cce16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
strncmp
strstr
rand
atoi
atol
malloc
realloc
_except_handler3
free
exit
strrchr
??2@YAPAXI@Z
_ftol
memmove
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
kernel32
GetStartupInfoA
GetModuleHandleA
GetCurrentThreadId
GetSystemTime
ExitProcess
CreateMutexA
GetLastError
OpenEventA
GetVersionExA
GetSystemInfo
GlobalMemoryStatusEx
HeapFree
GetProcAddress
LoadLibraryA
Sleep
VirtualAlloc
CreateEventA
ResetEvent
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
CloseHandle
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrcpyA
lstrlenA
TerminateThread
CreateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
GetEnvironmentVariableA
VirtualProtect
GetModuleFileNameA
DeleteFileA
GetSystemDirectoryA
SetFileAttributesA
MoveFileExA
MoveFileA
GetTickCount
GetTempPathA
HeapAlloc
GetProcessHeap
GetShortPathNameA
user32
ExitWindowsEx
wsprintfA
advapi32
ChangeServiceConfig2A
UnlockServiceDatabase
StartServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
SetServiceStatus
RegOpenKeyA
RegQueryValueExA
OpenServiceA
DeleteService
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LockServiceDatabase
CreateServiceA
ws2_32
WSAStartup
setsockopt
connect
htons
gethostbyname
socket
select
recv
closesocket
send
WSACleanup
gethostname
getsockname
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ