Static task
static1
Behavioral task
behavioral1
Sample
2c99b21ac358d344b2b748da9131014827ae8e49f9abe8e1e83942d2456c4699.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2c99b21ac358d344b2b748da9131014827ae8e49f9abe8e1e83942d2456c4699.exe
Resource
win10v2004-20221111-en
General
-
Target
2c99b21ac358d344b2b748da9131014827ae8e49f9abe8e1e83942d2456c4699
-
Size
391KB
-
MD5
13661d14e20599210367de8f7f864eba
-
SHA1
23b71f72696e4ee7fcabe75b925b660c2ffe920b
-
SHA256
2c99b21ac358d344b2b748da9131014827ae8e49f9abe8e1e83942d2456c4699
-
SHA512
d51874a457e24ba5de3edf63f227d6d538241674930dc193b14fe3949585b8b7082b759e1ce70aaf98202f846392803d2f0019837c45bf98560a763539118df9
-
SSDEEP
6144:1tS6S1dGppg6gUmXepiZujTthY8fMccz907DP3dMKsucbTb9Vhpfn2ifFvlt:EdGppg0zj7Y8Sz96jdbsucLJ5Fj
Malware Config
Signatures
Files
-
2c99b21ac358d344b2b748da9131014827ae8e49f9abe8e1e83942d2456c4699.exe windows x86
d8401fda32d518f943aabbab28dd8f67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LocalLock
GetFullPathNameA
TlsGetValue
CloseHandle
GetStdHandle
CreateFileMappingA
FreeEnvironmentStringsA
IsBadReadPtr
LoadLibraryExA
GetACP
HeapCreate
IsDebuggerPresent
GetLastError
LocalUnlock
CreateFileA
FindClose
CreateEventA
GetConsoleCP
GetModuleHandleA
user32
CreateDialogParamA
GetDC
EmptyClipboard
DispatchMessageA
SetFocus
IsWindow
GetDlgItem
ScrollWindow
DefWindowProcA
EndDialog
GetIconInfo
PostMessageA
GetMessageA
DrawIconEx
msasn1
ASN1BEREncLength
ASN1BERDecBool
ASN1BERDecEoid
ASN1BEREncFlush
ASN1BERDecCheck
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ