Static task
static1
Behavioral task
behavioral1
Sample
2faee71d2f9c2b8e84bbe7bc0cb4a75b5a5a8128dfb0b47c314923de9847981f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2faee71d2f9c2b8e84bbe7bc0cb4a75b5a5a8128dfb0b47c314923de9847981f.exe
Resource
win10v2004-20220812-en
General
-
Target
2faee71d2f9c2b8e84bbe7bc0cb4a75b5a5a8128dfb0b47c314923de9847981f
-
Size
14KB
-
MD5
0d32814e52c2472aff5c14254d1853a0
-
SHA1
9d9bcc7b40f320300c6f860f984aae1a4a241ce6
-
SHA256
2faee71d2f9c2b8e84bbe7bc0cb4a75b5a5a8128dfb0b47c314923de9847981f
-
SHA512
8510ad87c4b668a7c87af9d4e7c765130e4eecd278a0efef6bc0452882f8dae35e2eb05fb63251427e694bd70d11d4c4391b40ba584f2d5ed81cfd3ff3abb9e1
-
SSDEEP
192:Tt4avCKNZ9/q62XsF3/ET70GgahlZfvFA9vzJQhbjpBS1mhWoUqU/f5T:TqkCW8MbanZfvqg30/f5
Malware Config
Signatures
Files
-
2faee71d2f9c2b8e84bbe7bc0cb4a75b5a5a8128dfb0b47c314923de9847981f.exe windows x86
002a7f6443511e842d4ca601c05906f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateThread
CreateMutexA
GetVersionExA
lstrcmpiA
lstrcatA
DeleteFileA
lstrcpyA
GetTempFileNameA
GetTempPathA
Sleep
WinExec
lstrlenA
GetTickCount
ReadFile
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemDirectoryA
user32
FindWindowA
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegCloseKey
wininet
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
msvcp60
??1_Winit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
shell32
ShellExecuteA
msvcrt
strcat
atol
__CxxFrameHandler
_itoa
_except_handler3
_onexit
__dllonexit
sprintf
strcpy
strlen
memcpy
memset
malloc
strchr
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ