Static task
static1
Behavioral task
behavioral1
Sample
2f5269813e0717956acf58ee2e276368cf931482364cf1e0a9119e2bcf2d5de0.exe
Resource
win7-20220812-en
General
-
Target
2f5269813e0717956acf58ee2e276368cf931482364cf1e0a9119e2bcf2d5de0
-
Size
272KB
-
MD5
310d66d4488e4fd0e978c3e85973a308
-
SHA1
a25dfe830e1611f1eb8870a941a560c315db8fdc
-
SHA256
2f5269813e0717956acf58ee2e276368cf931482364cf1e0a9119e2bcf2d5de0
-
SHA512
3cb1cbef871dab640913a9bd7d9bdf5c85a91c9c5b9ce0844064ae8bf6c618c2320e2f57ad7a71424adafa43cbba1e08b42fa8c93bbd21422c3bf4d54b3659bb
-
SSDEEP
6144:9x5ZY0h2Bg8WNo+Ik/P/Godl8BwYf4Nnpwp2uWDBJJ3UWQi:nbYQ2ByC2H/Gob8iY6pC2u0Bvd
Malware Config
Signatures
Files
-
2f5269813e0717956acf58ee2e276368cf931482364cf1e0a9119e2bcf2d5de0.exe windows x86
22a9e236a49bc7fceb50980b3084f404
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapReAlloc
VirtualQuery
VirtualAlloc
TlsAlloc
SetLastError
GetSystemTimeAsFileTime
HeapDestroy
EnumSystemLanguageGroupsW
IsBadWritePtr
HeapCreate
GetWriteWatch
GetCurrentProcessId
HeapAlloc
QueryPerformanceCounter
VirtualFree
TlsFree
shell32
SHChangeNotify
SHGetMalloc
SHGetPathFromIDListW
shlwapi
PathAddBackslashW
winmm
mciSendCommandA
oleacc
CreateStdAccessibleObject
AccessibleChildren
user32
DestroyIcon
LoadStringA
GetDlgItem
GetWindow
SetWindowTextA
LoadImageA
CreateWindowExA
GetParent
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ