Static task
static1
Behavioral task
behavioral1
Sample
2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe
Resource
win10v2004-20220812-en
General
-
Target
2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5
-
Size
871KB
-
MD5
3aff01c41db37ff0d1d1f1e56bb402e6
-
SHA1
2746a2e258dbc58dd2379849c2858633405a2738
-
SHA256
2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5
-
SHA512
fd6a4df9eb1a695af5d276ecee770413c282990076250a1e025711aadea5018843d76942d2e5f43c575cbee5494344161fc1c394eec890c41ac8369a7128876a
-
SSDEEP
12288:Eb3af4Y8CxixTmNCOQaXrZG8WUmaY0PrXG62IGy49lnBtTNpMyqtS2:Een8Cij7GZmU7ljXv2IGHJtTNCHS2
Malware Config
Signatures
Files
-
2e68a9c2a35663f4260a4c815afc3041b0237c858661394a1d7b56ccb4a92da5.exe windows x86
bc8be3c64c095aaa8cc808c5df7982f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
PulseEvent
ResumeThread
SuspendThread
CancelIo
CreateFileA
GetModuleHandleA
DeleteFileA
IsBadStringPtrA
DeviceIoControl
GetDriveTypeA
IsDebuggerPresent
TlsAlloc
lstrlenA
TlsGetValue
CreateFileMappingA
ReleaseMutex
GetACP
GetStartupInfoA
GetModuleFileNameA
user32
GetIconInfo
DestroyMenu
GetWindowLongA
DispatchMessageA
IsWindow
LoadImageA
DispatchMessageA
PeekMessageA
CallWindowProcW
FindWindowW
DrawTextW
DestroyWindow
IsZoomed
amstream
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
clbcatq
ComPlusMigrate
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ