?ThreadA@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6.exe
Resource
win10v2004-20220901-en
General
-
Target
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
Size
147KB
-
MD5
cb2d6ea208bbd1e42fb69ceb461d2f72
-
SHA1
a88ca24aeef56d692feff6fe0f0ac9df09a82796
-
SHA256
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6
-
SHA512
e8a5be38e7f06b751068b3d43e56fe8a82d73c796e8f8044498878e1bd8cc7b0d497e34f81b74c753235e7af4a6a196981c515a4778fc7cc8a62ca7505fa3301
-
SSDEEP
3072:FaJvDmCOU4piJA7vrOaUNC3Hjljb7K/w/qKewWZIiB64d5vPtjnXuG:FaJvqvU4lrOR83U/wCwWqild5vPl
Malware Config
Signatures
Files
-
215e37b2c56e74858f610aa6625c64f1b99f9e05f3261d2b4196b0246611a8c6.exe windows x86
0c3d2c79c092c3cc432f459afb7a447b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetForegroundWindow
GetActiveWindow
kernel32
CreateNamedPipeW
GetDateFormatA
VirtualProtect
GetStdHandle
GlobalLock
CreateDirectoryW
OpenEventA
SetFileAttributesA
GetSystemDefaultLangID
SetPriorityClass
EnumResourceNamesA
GetUserDefaultLangID
GetUserDefaultUILanguage
GlobalGetAtomNameA
GetProcAddress
GetComputerNameW
GetCurrentThreadId
IsBadCodePtr
PulseEvent
GetThreadContext
UnhandledExceptionFilter
SetupComm
GetFileSize
EscapeCommFunction
HeapSize
GetProcessHeap
TryEnterCriticalSection
GetSystemDirectoryA
CreateMutexA
GetPriorityClass
VirtualQuery
GetTempPathA
OpenFile
GetDateFormatW
CreateRemoteThread
HeapWalk
GetFileTime
AddAtomW
SetCurrentDirectoryW
GetComputerNameExA
GetCPInfo
WaitForMultipleObjects
GetCommConfig
GlobalDeleteAtom
OpenSemaphoreW
lstrcmpW
IsValidLocale
LoadResource
CreateDirectoryA
LoadLibraryA
FindFirstFileW
FileTimeToSystemTime
GetThreadPriority
SetCommMask
MoveFileExA
lstrcpyW
DisconnectNamedPipe
SuspendThread
GetTimeZoneInformation
GetNumberFormatW
AreFileApisANSI
FindNextFileA
GetTickCount
GetWindowsDirectoryW
CreateMailslotW
RaiseException
GetFileAttributesExW
SetFilePointer
QueryDosDeviceW
RemoveDirectoryW
EnumResourceTypesA
GetBinaryTypeA
GlobalMemoryStatusEx
GetFileAttributesA
FoldStringW
CreateFileMappingW
FindResourceExA
SetFileApisToOEM
SetUnhandledExceptionFilter
GetFileAttributesExA
FindResourceExW
FindNextChangeNotification
GetLongPathNameW
ExitThread
GetSystemTimeAsFileTime
GlobalCompact
EnterCriticalSection
CopyFileW
TlsFree
IsDBCSLeadByte
LoadLibraryExA
lstrcatW
DeleteAtom
GetSystemDirectoryW
GetFullPathNameA
SetThreadExecutionState
GlobalAddAtomA
ResumeThread
VirtualFree
GetSystemTime
SetErrorMode
VirtualAlloc
DeleteCriticalSection
GetModuleHandleW
WaitForSingleObject
IsDBCSLeadByteEx
SearchPathW
GetOEMCP
GetNumberFormatA
LoadLibraryExW
CancelIo
GetCommState
GetHandleInformation
AddAtomA
OpenFileMappingA
SetCommTimeouts
SetNamedPipeHandleState
CompareStringA
GetWindowsDirectoryA
Sleep
SetTimerQueueTimer
CreateWaitableTimerW
GetAtomNameA
CreateWaitableTimerA
GetCurrentThread
GetShortPathNameW
FindResourceW
MapViewOfFile
SetThreadAffinityMask
GetShortPathNameA
CreateThread
GetFileAttributesW
DeleteFileW
GetLastError
FindResourceA
GetCommTimeouts
ClearCommError
HeapValidate
CreateSemaphoreW
GlobalAlloc
LocalReAlloc
RegisterWaitForSingleObject
CreateFileMappingA
WaitCommEvent
WideCharToMultiByte
IsBadStringPtrW
WinExec
LCMapStringW
ReleaseMutex
TransactNamedPipe
SleepEx
GetBinaryTypeW
DefineDosDeviceW
GetSystemWindowsDirectoryA
LocalAlloc
SetEndOfFile
MoveFileA
CancelWaitableTimer
DuplicateHandle
FormatMessageA
LockFile
LocalLock
GetSystemWindowsDirectoryW
SetHandleCount
FreeResource
GetLocaleInfoW
GetCommandLineW
GetLocalTime
GlobalUnlock
WaitForMultipleObjectsEx
ReadFile
FlushViewOfFile
SetLastError
RemoveDirectoryA
WaitForSingleObjectEx
SetSystemTimeAdjustment
GetTempPathW
FreeLibrary
SetSystemTime
LCMapStringA
CreateFileW
VerifyVersionInfoW
ReleaseSemaphore
Exports
Exports
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.mist Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cist Size: 512B - Virtual size: 335B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rist Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.qist Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dist Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sist Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xist Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oist Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kist Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ