Static task
static1
Behavioral task
behavioral1
Sample
2460d9d7d6f5f571b93f04708a580f049da97e2e4b389afe0a115e64e0f71820.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2460d9d7d6f5f571b93f04708a580f049da97e2e4b389afe0a115e64e0f71820.exe
Resource
win10v2004-20220812-en
General
-
Target
2460d9d7d6f5f571b93f04708a580f049da97e2e4b389afe0a115e64e0f71820
-
Size
4.3MB
-
MD5
44006b798e697f48e0de53caeca3e578
-
SHA1
71cf1a559c7b6a4a33f484f67a618ba83e9a6e2d
-
SHA256
2460d9d7d6f5f571b93f04708a580f049da97e2e4b389afe0a115e64e0f71820
-
SHA512
98b7d7315e01e9591346b204155f97596872a527abcf908cc979adfaaa70cc407059fb2bd75d23a9cf46de45362deb29fa8561a7eb36be5f2001a884c1a44547
-
SSDEEP
49152:qCOqIz5U23CZ+6rmxup4kdGKvghxfki1jPXGIjQ7Z8hpTQd8b:J25U946CKc5P2iQ7Zspsd8
Malware Config
Signatures
Files
-
2460d9d7d6f5f571b93f04708a580f049da97e2e4b389afe0a115e64e0f71820.exe windows x86
39228d1d228f54cebd3bf9d13ef87302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetProcessHeap
InterlockedCompareExchange
SetLastError
GetVersionExA
GetModuleHandleA
HeapReAlloc
LeaveCriticalSection
DisableThreadLibraryCalls
CreateFileW
VirtualAlloc
VirtualFree
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
EnterCriticalSection
CloseHandle
GetCurrentThreadId
LocalFileTimeToFileTime
ReadFile
GetTickCount
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegEnumKeyExW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyExA
user32
GetWindowRect
CreateWindowExW
GetClientRect
GetWindowTextW
RegisterClassExA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
RegisterClassExW
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RedrawWindow
SetForegroundWindow
PostMessageW
SendMessageA
DefWindowProcA
RegisterWindowMessageW
MessageBoxW
SendMessageW
TrackPopupMenu
ShowWindow
UpdateWindow
FindWindowW
GetParent
LoadIconW
PostMessageA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ