Static task
static1
Behavioral task
behavioral1
Sample
2a0f64afd3e6264b2576605f3387f4a97bd559b7a30592b05f98d724342b9e2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a0f64afd3e6264b2576605f3387f4a97bd559b7a30592b05f98d724342b9e2c.exe
Resource
win10v2004-20221111-en
General
-
Target
2a0f64afd3e6264b2576605f3387f4a97bd559b7a30592b05f98d724342b9e2c
-
Size
180KB
-
MD5
3890edb7099d0806666ff49f4f90e8a0
-
SHA1
471cb43460e47b118cd6107fc0a84f3680ae393b
-
SHA256
2a0f64afd3e6264b2576605f3387f4a97bd559b7a30592b05f98d724342b9e2c
-
SHA512
5f0761837a87010a315903eb8a49079a262552d9483d178ea9193642c155a58a60d66a26594fdda138128389a244a602811b945e7d30902ddf182095a2eec066
-
SSDEEP
3072:6CbaiGifn66bNkZqPoqXEsHxh0Z1YHn5CVGhGnQJpfi0tW6ePVbN:NJ66b64Pvh0EHn5iGhXNIPVJ
Malware Config
Signatures
Files
-
2a0f64afd3e6264b2576605f3387f4a97bd559b7a30592b05f98d724342b9e2c.exe windows x86
b8a00ec274d12b05773a9882bec9165c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconW
ExtractIconW
ShellExecuteExA
ExtractIconExW
ExtractIconA
ShellExecuteExW
ShellExecuteA
ExtractAssociatedIconA
ole32
OleCreateLinkFromDataEx
OleCreateLinkToFileEx
CoCreateInstanceEx
CreateOleAdviseHolder
MonikerCommonPrefixWith
CoBuildVersion
CreateAntiMoniker
OleDestroyMenuDescriptor
advapi32
IsValidSid
InitializeSid
RegOpenKeyW
GetOldestEventLogRecord
AddAccessAllowedAce
ClearEventLogW
GetUserNameA
GetLengthSid
ChangeServiceConfigW
kernel32
SetFilePointer
GetConsoleCP
GetStringTypeW
LoadLibraryW
HeapReAlloc
FlushFileBuffers
SetStdHandle
HeapSize
WriteConsoleW
HeapSetInformation
FormatMessageA
WritePrivateProfileSectionW
lstrcpynW
CreateRemoteThread
SetLocalTime
FindFirstVolumeA
SetInformationJobObject
GetLastError
GetFullPathNameA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
HeapCreate
GetDiskFreeSpaceA
GetLogicalDrives
GetCommandLineA
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetDriveTypeW
HeapFree
MultiByteToWideChar
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetProcAddress
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
LCMapStringW
CreateFileW
CloseHandle
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
IsProcessorFeaturePresent
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
GetCurrentDirectoryW
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ