Static task
static1
Behavioral task
behavioral1
Sample
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe
Resource
win10v2004-20220812-en
General
-
Target
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e
-
Size
143KB
-
MD5
2c2d0a57aa10c93edf20acf0bbc8700d
-
SHA1
e3a352112f9b0745f9b8cb3aaa4f0e035b1af888
-
SHA256
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e
-
SHA512
e2f787b462df54b7e5ce9758d132f3fe902595d0f63f3b3c296fd782e5de842684f1f7b96748ffca7c69c25ffce53323b8936c29b7325557715611a78af2884e
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45D7:pe9IB83ID5X
Malware Config
Signatures
Files
-
2d397ed132b8704c6fb8e1d446fb1f0b68eb96cd9a56b1449f623c29506d494e.exe windows x86
dbe129d5088d493503666c0323721783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winhttp
WinHttpSendRequest
WinHttpCrackUrl
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSetOption
shlwapi
StrCpyW
StrStrIW
StrToIntExA
StrCatW
PathAddBackslashW
StrToIntW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToFileW
URLDownloadToCacheFileW
kernel32
GetACP
GetCPInfo
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
IsValidCodePage
HeapFree
GetProcessHeap
IsWow64Process
GetCurrentProcess
GetVersionExW
CloseHandle
GetFileSize
CreateFileW
GetTickCount
GetLastError
ReadFile
WaitForSingleObject
CreateProcessW
lstrcatW
FreeLibrary
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
lstrcmpiW
GetCommandLineW
lstrlenW
GlobalFree
lstrcpyW
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeThread
CreateThread
Sleep
HeapAlloc
CreateEventExW
GetTempPathW
lstrcmpiA
lstrcatA
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetCurrentProcessId
GetModuleHandleW
WaitForMultipleObjects
ResumeThread
GetEnvironmentStringsW
TerminateProcess
OpenProcess
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
CreateDirectoryW
SetLastError
LocalFree
GetFileType
GetOEMCP
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ExitProcess
GetProcAddress
HeapCreate
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
GetStringTypeA
GetStringTypeW
LCMapStringW
LCMapStringA
GetTempFileNameW
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
user32
LoadIconW
SetWindowTextW
DestroyMenu
SetDlgItemTextW
ShowWindow
SetTimer
GetDlgItem
SendMessageW
GetWindowLongW
SetWindowLongW
wsprintfW
TrackPopupMenuEx
GetCursorPos
AppendMenuW
CreatePopupMenu
DialogBoxParamW
GetDlgItemTextW
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
advapi32
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
CommandLineToArgvW
Shell_NotifyIconW
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ