Static task
static1
Behavioral task
behavioral1
Sample
2e0b4c3ef95e3a84ed0388153d069202cb925059d80ea9c8d22203eae76a107a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2e0b4c3ef95e3a84ed0388153d069202cb925059d80ea9c8d22203eae76a107a.exe
Resource
win10v2004-20220812-en
General
-
Target
2e0b4c3ef95e3a84ed0388153d069202cb925059d80ea9c8d22203eae76a107a
-
Size
576KB
-
MD5
adfd436ac156dccadb26d21edcd6c542
-
SHA1
02aa5da8b68cb3d04e8386f287364e2b40f9eab0
-
SHA256
2e0b4c3ef95e3a84ed0388153d069202cb925059d80ea9c8d22203eae76a107a
-
SHA512
2015c9493ccb6b5a00b744e42665adb4fe6076ec00ae2bc2a9d6fe8a42a9f9ea152870713f7a1670aa7128bf6b9adb84d4ce2b5db59830b361088d879003fd31
-
SSDEEP
12288:UoVKFO1Q7FnvvjoA27Bs/k0D7TydavL0GMIljO:RVKFO1IFnvvaak0DZJxI
Malware Config
Signatures
Files
-
2e0b4c3ef95e3a84ed0388153d069202cb925059d80ea9c8d22203eae76a107a.exe windows x86
57a11bdab29b64da5240f945a9685ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteConsoleOutputA
CreateMutexA
EnterCriticalSection
QueryPerformanceCounter
GetTimeFormatA
WriteConsoleOutputCharacterW
GetStdHandle
MultiByteToWideChar
GetCurrentThreadId
ExitProcess
GetDriveTypeW
GetDateFormatA
IsBadWritePtr
GetFileType
HeapReAlloc
GetStartupInfoA
TlsGetValue
GetCurrentProcessId
GetUserDefaultLCID
FlushFileBuffers
SetFilePointer
SetLastError
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsA
IsValidCodePage
CloseHandle
GetLocaleInfoA
GetCPInfo
GlobalAddAtomW
LocalFileTimeToFileTime
OpenMutexA
TlsFree
FreeEnvironmentStringsW
TlsSetValue
HeapSize
GetTimeZoneInformation
TerminateProcess
LocalHandle
HeapAlloc
LoadLibraryA
GetEnvironmentStringsW
GetACP
GetModuleFileNameA
SetEnvironmentVariableA
GetOEMCP
LCMapStringA
ReadFile
GetSystemTimeAsFileTime
GetVersionExA
HeapDestroy
VirtualProtect
InterlockedExchange
UnhandledExceptionFilter
GetLocaleInfoW
GetThreadPriority
TlsAlloc
lstrcpyA
EnumSystemLocalesA
GetCurrentThread
VirtualQuery
VirtualAlloc
RtlMoveMemory
RtlFillMemory
RtlUnwind
CompareStringA
WriteFile
GetLastError
SetLocalTime
WideCharToMultiByte
LCMapStringW
GetProcAddress
DebugBreak
GetSystemInfo
GetStringTypeW
IsValidLocale
VirtualFree
GetUserDefaultLangID
HeapCreate
WriteProfileSectionA
GetCurrentProcess
SetFileTime
GlobalDeleteAtom
InitializeCriticalSection
SetStdHandle
HeapFree
GetCurrencyFormatA
GetStringTypeA
DebugActiveProcess
GetTickCount
GetModuleHandleA
LeaveCriticalSection
CompareStringW
GlobalSize
GlobalGetAtomNameA
GetCommandLineA
user32
EnumThreadWindows
RegisterClassExA
OemToCharW
ScrollWindowEx
ModifyMenuA
SetWindowsHookExA
ArrangeIconicWindows
SetCapture
GetMessagePos
ExitWindowsEx
DdeGetData
RegisterClassA
SetMenuItemInfoA
MessageBoxIndirectW
GetProcessDefaultLayout
ModifyMenuW
GetScrollRange
IsZoomed
comctl32
InitCommonControlsEx
DrawStatusTextW
ImageList_GetImageCount
ImageList_Duplicate
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ