Static task
static1
Behavioral task
behavioral1
Sample
2d759de4ac1926091b9f103a851b175fad9ff8557bb6bbf08051ef47a4ebc390.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2d759de4ac1926091b9f103a851b175fad9ff8557bb6bbf08051ef47a4ebc390.exe
Resource
win10v2004-20221111-en
General
-
Target
2d759de4ac1926091b9f103a851b175fad9ff8557bb6bbf08051ef47a4ebc390
-
Size
70KB
-
MD5
3001ad8fb81575840ae088487b20ce78
-
SHA1
bc81ba341309283657386520b1c4c50aaa436717
-
SHA256
2d759de4ac1926091b9f103a851b175fad9ff8557bb6bbf08051ef47a4ebc390
-
SHA512
7acf7965afd8818a59337230f05ad1fbf533cc2c5dc13feb00729167c3c0b6f8f264dc86bb9e6fbeccc94b0eacfec5bf4065d35d2903adf23c147dae84b3de75
-
SSDEEP
1536:kpB/plCXRzIGRnDyB2QypAPvVf19GeupnhWKn4Sau:kpRplChMGRDy3IA97Geupnhh4Sau
Malware Config
Signatures
Files
-
2d759de4ac1926091b9f103a851b175fad9ff8557bb6bbf08051ef47a4ebc390.exe windows x86
f36b46f28022ee4585e06a33f3539738
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetVersionExA
WaitForSingleObject
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
WinExec
lstrcatA
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceA
GlobalAlloc
EnterCriticalSection
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcmpA
FlushInstructionCache
GetCurrentProcess
FindClose
FindFirstFileA
LeaveCriticalSection
Sleep
GetTickCount
WriteFile
MultiByteToWideChar
DeleteFileA
CreateFileA
SetFilePointer
CreateThread
ResumeThread
GetModuleHandleA
GetProcAddress
CreateMutexA
GetLastError
CloseHandle
GetTempPathA
lstrlenA
CreateDirectoryA
lstrcpyA
GlobalUnlock
CreateProcessA
GetStartupInfoA
user32
CharLowerA
PostMessageA
ShowWindow
GetWindowRect
SetWindowPos
SetWindowTextA
SetTimer
InvalidateRgn
EndDialog
GetDlgItem
EnableWindow
DefWindowProcA
DialogBoxParamA
KillTimer
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetWindowTextLengthA
GetClassNameA
RedrawWindow
GetDesktopWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
DestroyWindow
SetFocus
MessageBeep
SetDlgItemTextA
GetWindowTextA
GetDlgItemInt
SetDlgItemInt
CreateWindowExA
MessageBoxA
GetActiveWindow
GetDC
ReleaseDC
GetFocus
IsChild
GetSysColor
IsWindow
SetRect
wsprintfA
LoadStringA
CharNextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DialogBoxIndirectParamA
GetWindowLongA
GetParent
GetWindow
GetClientRect
MapWindowPoints
SendMessageA
SystemParametersInfoA
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateSolidBrush
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
OleCreateFontIndirect
DispCallFunc
SysAllocString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
VariantClear
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetErrorDlg
InternetQueryOptionA
InternetCloseHandle
msvcrt
strstr
??2@YAPAXI@Z
_ftol
atol
atoi
_mbsrchr
atof
_mbscmp
_mbsstr
free
wcslen
_ismbcspace
memmove
vsprintf
malloc
_ismbcdigit
_purecall
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
shell32
ShellExecuteA
Sections
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ