Static task
static1
Behavioral task
behavioral1
Sample
2065b5b75fdc73107898a89f4266b4b5ece91ddb20c8edaadec0393b022e1aca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2065b5b75fdc73107898a89f4266b4b5ece91ddb20c8edaadec0393b022e1aca.exe
Resource
win10v2004-20220901-en
General
-
Target
2065b5b75fdc73107898a89f4266b4b5ece91ddb20c8edaadec0393b022e1aca
-
Size
862KB
-
MD5
e7e1e82c584469a54b3fa2d41c2bf575
-
SHA1
bcd0fa22edeb368c3ab9034ad8cbce1016aece9e
-
SHA256
2065b5b75fdc73107898a89f4266b4b5ece91ddb20c8edaadec0393b022e1aca
-
SHA512
0b7ef3fca7ddd57a299647fb18162c269ffeb14ba881583753e4a68b430c0f276ea5247855753838a30e3c3994b31d7bafca908dc4b90b9a560cf256217d69c6
-
SSDEEP
12288:XW+9cR279hHCrsO8QUlXKV3gJN/G1QvaRKDiTEaTzZhXJF9d684EhUlvwHq:x2omwO8VlXWwJNfiDTE2XvNyFwK
Malware Config
Signatures
Files
-
2065b5b75fdc73107898a89f4266b4b5ece91ddb20c8edaadec0393b022e1aca.exe windows x86
59ab5db6f1771ceee5966e469c99ca88
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
CompareStringA
GetShortPathNameW
CreateWaitableTimerA
Module32FirstW
CreateMutexW
MoveFileWithProgressW
GetBinaryTypeW
GetEnvironmentVariableA
DebugBreak
GetWindowsDirectoryA
CreateEventA
GetFullPathNameA
RemoveDirectoryA
OpenFileMappingA
GetTimeZoneInformation
CreateDirectoryExA
FindFirstVolumeW
FindNextFileA
lstrcatA
CreateMutexA
GetBinaryTypeA
SearchPathA
GetThreadTimes
GetFileInformationByHandle
IsDebuggerPresent
SetProcessWorkingSetSize
GetFileSize
GetQueuedCompletionStatus
SetThreadIdealProcessor
GetProcessTimes
TlsSetValue
DeviceIoControl
GlobalSize
IsValidCodePage
OpenJobObjectW
Module32NextW
FlushViewOfFile
GetDiskFreeSpaceA
ReadDirectoryChangesW
SetPriorityClass
TlsAlloc
GetLocalTime
GetFullPathNameW
DeleteFileA
CreateTimerQueue
GlobalMemoryStatus
GetACP
LocalReAlloc
SetThreadPriorityBoost
GetProfileSectionA
LoadResource
GetDateFormatW
FreeEnvironmentStringsA
GetConsoleAliasesA
ProcessIdToSessionId
CreateIoCompletionPort
SetHandleInformation
SetProcessPriorityBoost
GlobalHandle
CreateEventW
GetFileTime
DeleteTimerQueue
DuplicateHandle
GetFileType
GetSystemDefaultUILanguage
GetPrivateProfileStructA
GetAtomNameA
FindFirstVolumeA
GetPrivateProfileStringW
GetLogicalDriveStringsW
GetThreadContext
GetProfileStringW
GetUserDefaultUILanguage
GetDiskFreeSpaceExW
GetSystemDirectoryA
GetFileSizeEx
OpenWaitableTimerW
CreateFileMappingA
SetEnvironmentVariableW
GetEnvironmentStrings
GetThreadPriority
OpenJobObjectA
OpenProcess
GetDiskFreeSpaceExA
LCMapStringW
SetFileAttributesW
CreateHardLinkA
GetStringTypeA
GetShortPathNameA
GetTempPathW
CreateFileW
FoldStringW
SetWaitableTimer
SetMailslotInfo
ResetWriteWatch
GetTimeFormatA
GetLogicalDriveStringsA
GetSystemDefaultLangID
FileTimeToDosDateTime
SetVolumeMountPointA
GetUserDefaultLCID
AssignProcessToJobObject
QueueUserWorkItem
GetVolumePathNameA
CreateTapePartition
lstrcpyW
GlobalAddAtomW
GetSystemDefaultLCID
GetCPInfo
CancelIo
ReleaseSemaphore
Module32Next
GetWindowsDirectoryW
SetFileTime
GetProcessIoCounters
SetNamedPipeHandleState
ReleaseMutex
CreateDirectoryA
GetDriveTypeA
GetConsoleAliasExesW
FindAtomW
FindFirstFileA
GetNamedPipeInfo
IsSystemResumeAutomatic
SetCalendarInfoA
UnlockFile
SetLocaleInfoW
GetStartupInfoW
GetStringTypeExA
GetFileAttributesExA
CreateSemaphoreW
GetNamedPipeHandleStateA
GetVolumePathNameW
SetConsoleMode
GetHandleInformation
FlushConsoleInputBuffer
GetPrivateProfileSectionA
GetCommandLineW
SetFileAttributesA
VerSetConditionMask
GetSystemWindowsDirectoryW
CopyFileExW
VirtualAlloc
MapUserPhysicalPages
CreateHardLinkW
CreateWaitableTimerW
GetConsoleAliasA
FormatMessageW
ExpandEnvironmentStringsA
OpenMutexA
GetLongPathNameA
FlushInstructionCache
FindResourceW
FreeConsole
AreFileApisANSI
DosDateTimeToFileTime
GetNumberFormatA
EraseTape
DefineDosDeviceW
GetCompressedFileSizeA
MapViewOfFileEx
SetCalendarInfoW
GetConsoleAliasExesLengthA
GetTapeStatus
GetLongPathNameW
SetEnvironmentVariableA
GetPrivateProfileIntA
SetEndOfFile
GetConsoleScreenBufferInfo
user32
GetMenuItemID
advapi32
CryptAcquireContextA
RegDeleteValueW
ChangeServiceConfigW
GetSecurityDescriptorLength
CreateProcessAsUserW
RegEnumKeyExW
EqualSid
CryptCreateHash
ControlService
DeregisterEventSource
RegCreateKeyExA
StartServiceA
OpenSCManagerA
SetNamedSecurityInfoW
ReportEventW
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
RegEnumValueW
RegCreateKeyExW
RegQueryValueW
RegQueryInfoKeyA
GetSidSubAuthorityCount
QueryServiceStatus
RegDeleteValueA
shell32
SHBindToParent
SHGetSpecialFolderLocation
SHChangeNotify
SHGetDesktopFolder
ShellExecuteExW
SHGetFileInfoW
SHFileOperationW
CommandLineToArgvW
SHBrowseForFolderW
SHGetFolderPathW
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteW
oleaut32
SysFreeString
SafeArrayGetLBound
VariantCopyInd
SafeArrayGetUBound
VariantChangeType
SysAllocStringLen
GetActiveObject
SysAllocStringByteLen
SafeArrayCreate
VariantInit
GetErrorInfo
VariantCopy
VariantClear
VariantChangeTypeEx
SysStringLen
SafeArrayPtrOfIndex
SysReAllocStringLen
Sections
.text Size: 419KB - Virtual size: 419KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 410KB - Virtual size: 739KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ