Static task
static1
Behavioral task
behavioral1
Sample
2d9e313f241a6d1a1ec0c1a386d716f6ad11e0f0127d36f8c4921414f08b81b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d9e313f241a6d1a1ec0c1a386d716f6ad11e0f0127d36f8c4921414f08b81b7.exe
Resource
win10v2004-20220901-en
General
-
Target
2d9e313f241a6d1a1ec0c1a386d716f6ad11e0f0127d36f8c4921414f08b81b7
-
Size
223KB
-
MD5
6e62e14b14abd11a80037791ed9b9e76
-
SHA1
142e5e96f2c408beb4728873e6aa83c624a8854d
-
SHA256
2d9e313f241a6d1a1ec0c1a386d716f6ad11e0f0127d36f8c4921414f08b81b7
-
SHA512
488d657a7353ae35b009c803a1412d0720736eff79c2b3ee858fa9c4ca251e3b80afb9e288eb718c1b2a7048d917ec9fa5155260997b0d718fb15c8b22023e3e
-
SSDEEP
3072:8Itu52uqpiMSbggZVyQZVbnYTdHJ0KRuX28PpWE+Fj2a119B6RRRRRRRRRRRRRR3:8Mt63bnvZVbYTdHSFpj8X11vWX
Malware Config
Signatures
Files
-
2d9e313f241a6d1a1ec0c1a386d716f6ad11e0f0127d36f8c4921414f08b81b7.exe windows x86
60eda45ed9195e2968758b61b6601296
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
ReadFile
WriteFile
DeleteFileW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
CloseHandle
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
FlushFileBuffers
FindResourceExW
GetModuleHandleW
GetProcAddress
Sleep
ReleaseMutex
GetNativeSystemInfo
InterlockedDecrement
GetPriorityClass
Module32FirstW
HeapDestroy
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
IsProcessorFeaturePresent
GetFileSize
CreateFileW
GetFileAttributesW
GetSystemTime
HeapFree
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
LocalFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
SetUnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
GetCurrentThreadId
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
InterlockedIncrement
user32
ShowWindow
GetDlgItem
PeekMessageW
SendMessageW
CreateDialogParamW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
advapi32
GetCurrentHwProfileW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
ole32
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
oleaut32
SysStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
VariantClear
SysAllocString
VariantInit
VarBstrCat
VariantChangeType
shlwapi
StrCmpW
StrToIntExW
PathFileExistsW
winhttp
WinHttpConnect
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSetOption
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
rpcrt4
UuidToStringW
UuidEqual
UuidCreate
UuidCreateSequential
RpcStringFreeW
Sections
.4CAA559 Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ