Static task
static1
Behavioral task
behavioral1
Sample
2e344ecfb1e7c2f116f4b9ea9d40441b27ddea990adfb4a0c2a1bacaa229a548.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e344ecfb1e7c2f116f4b9ea9d40441b27ddea990adfb4a0c2a1bacaa229a548.exe
Resource
win10v2004-20221111-en
General
-
Target
2e344ecfb1e7c2f116f4b9ea9d40441b27ddea990adfb4a0c2a1bacaa229a548
-
Size
152KB
-
MD5
0477507e7d163a59413cf95a288849fc
-
SHA1
63fc9082190c35b479e7e3d208b9201bea5ecdc4
-
SHA256
2e344ecfb1e7c2f116f4b9ea9d40441b27ddea990adfb4a0c2a1bacaa229a548
-
SHA512
34cd0c87312d48c5634be7552d3af13e66762ed5749ba1525911b630cd249517cce5a64491225000517a249d52dd0017fd1f5d366beb9dd02712c25e753f1055
-
SSDEEP
3072:b/PsO2s4Aoms9XQtoLJCQUv06DlYBsDCvcO1pRBgd:b/P3oms9XQSIQU7HDcV1pRBgd
Malware Config
Signatures
Files
-
2e344ecfb1e7c2f116f4b9ea9d40441b27ddea990adfb4a0c2a1bacaa229a548.exe windows x86
6be3ef418491b9c85af79aca0b0ed689
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
VirtualFree
lstrcpyA
SetEvent
GetPrivateProfileSectionNamesA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
LocalFree
LocalAlloc
RemoveDirectoryA
WriteFile
Sleep
ReadFile
SetFilePointer
GetLastError
CreateProcessA
MoveFileA
GetLocalTime
CreateEventA
GlobalFree
GlobalUnlock
ReleaseMutex
SetErrorMode
WaitForSingleObject
OutputDebugStringA
lstrlenA
InterlockedExchange
FreeLibrary
RaiseException
GetStartupInfoA
GetModuleHandleA
msvcrt
strncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
_errno
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
atoi
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
__getmainargs
ceil
_CxxThrowException
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_strnicmp
msvcp60
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xran@std@@YAXXZ
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ