Static task
static1
Behavioral task
behavioral1
Sample
2dd34c474c172ea4cf7c57706263294887ccf5e80be80b588911112dcbf3102c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2dd34c474c172ea4cf7c57706263294887ccf5e80be80b588911112dcbf3102c.exe
Resource
win10v2004-20220901-en
General
-
Target
2dd34c474c172ea4cf7c57706263294887ccf5e80be80b588911112dcbf3102c
-
Size
3.5MB
-
MD5
05163c8185d81fe49719809578406557
-
SHA1
49e0af6c4bd1f9c05c6870bb06a770c4396272f5
-
SHA256
2dd34c474c172ea4cf7c57706263294887ccf5e80be80b588911112dcbf3102c
-
SHA512
80c62883746ddbe8e6932dabc46b0c1986af1958d63632c868e3e002f69b7340b63a361041f7dd976b131786e599e1144f48652940b0e6216ad0a9e4542a262d
-
SSDEEP
49152:psghV5DmXzdThWTxVAqRxd0/EkG0F1ZrAPKYqkIiAFQeFn6EULddeqBU3u+D:qaKDCRxd0M61Ik9FZt+
Malware Config
Signatures
Files
-
2dd34c474c172ea4cf7c57706263294887ccf5e80be80b588911112dcbf3102c.exe windows x86
d38293abbcefec606cb23c109b66f0fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetTickCount
RemoveDirectoryA
ReadFile
LoadLibraryA
GetProcAddress
GetTempPathA
CloseHandle
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
InterlockedCompareExchange
ExitProcess
GetModuleHandleA
GetVersionExA
VirtualAlloc
VirtualFree
Sleep
SetLastError
AddVectoredExceptionHandler
CreateFileW
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
SetEndOfFile
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
PostMessageW
DispatchMessageA
PostMessageA
MessageBoxW
MessageBoxA
PeekMessageA
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ