?ThreadA@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
2bc9f727d7f80ea180ede61e315c9f009c8c559ce783e91092f62bf03abab324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2bc9f727d7f80ea180ede61e315c9f009c8c559ce783e91092f62bf03abab324.exe
Resource
win10v2004-20220812-en
General
-
Target
2bc9f727d7f80ea180ede61e315c9f009c8c559ce783e91092f62bf03abab324
-
Size
149KB
-
MD5
5190c5cab7448833bc6a16f9c7e3ec10
-
SHA1
03e31961568c95ecfb1032a3ed6fb0745a8b6ad3
-
SHA256
2bc9f727d7f80ea180ede61e315c9f009c8c559ce783e91092f62bf03abab324
-
SHA512
807608ae67651d2851da1e984643d00ed66e88318b298dcc52b674f3d70cefb2f903929f487ba164812e2d4fc8555283f4929505535d082318124d260ff5fd34
-
SSDEEP
3072:UDK9r6VrzoKLsxXE5cJ6XUZzFJDo6QrhsZWnY+8XJbGu+0UFqNAhV663zpEQ:UDKg5zuxzQ+F6zGqsG66lEQ
Malware Config
Signatures
Files
-
2bc9f727d7f80ea180ede61e315c9f009c8c559ce783e91092f62bf03abab324.exe windows x86
732ab14e5a4954e353f95e08b49b0dbd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetForegroundWindow
kernel32
CreateMutexA
GetFullPathNameA
ResumeThread
lstrcatW
GlobalGetAtomNameW
GetCurrentThread
SetCommState
SetHandleCount
SetFileAttributesW
GetShortPathNameA
MapViewOfFile
SetFileAttributesA
EnterCriticalSection
GetTickCount
IsBadWritePtr
LCMapStringA
GetTempFileNameA
Sleep
FileTimeToSystemTime
SearchPathA
GetStartupInfoA
CallNamedPipeW
GetSystemInfo
FindFirstFileA
CreateRemoteThread
ConvertDefaultLocale
CreateFileW
LocalAlloc
GlobalAlloc
WaitForSingleObject
VirtualProtect
TlsFree
GetSystemDefaultLangID
GlobalSize
UnmapViewOfFile
FormatMessageA
WriteFile
CreateFileA
FreeLibrary
GetFileAttributesExA
GetCompressedFileSizeW
SetThreadAffinityMask
FindResourceExW
MulDiv
GetLocaleInfoW
GlobalHandle
CopyFileA
CreateThread
HeapLock
lstrcpynW
WaitForMultipleObjectsEx
GetComputerNameExA
IsBadStringPtrW
ResetEvent
lstrcpyA
OpenFileMappingA
GetNumberFormatW
LocalLock
SetFileApisToOEM
LocalFree
CreateMutexW
OpenFileMappingW
GetModuleFileNameA
DeleteCriticalSection
GetFullPathNameW
GlobalDeleteAtom
RegisterWaitForSingleObject
CreateWaitableTimerW
InitializeCriticalSection
GetComputerNameW
GetOverlappedResult
GetUserDefaultLCID
LoadLibraryExW
GetAtomNameA
SetErrorMode
GetSystemTime
GetSystemWindowsDirectoryW
LoadResource
GetThreadLocale
WaitForSingleObjectEx
LocalReAlloc
CreateMailslotW
LockResource
FindNextFileW
ReleaseMutex
VerifyVersionInfoW
HeapFree
GetWindowsDirectoryW
GlobalMemoryStatus
LoadLibraryA
GetDateFormatA
IsValidLanguageGroup
SetThreadLocale
SetEndOfFile
FindCloseChangeNotification
CompareStringW
GetSystemTimeAsFileTime
CompareFileTime
GetTempPathW
GetTempFileNameW
VirtualQuery
GetShortPathNameW
GetHandleInformation
HeapWalk
MoveFileExA
GetSystemWindowsDirectoryA
CreateDirectoryA
lstrcpyW
EnumResourceNamesA
WinExec
FreeResource
CreateSemaphoreA
TerminateThread
lstrcmpiW
DeviceIoControl
GetCurrentDirectoryW
GlobalFindAtomW
GlobalAddAtomW
GetDateFormatW
IsBadReadPtr
LockFile
EscapeCommFunction
CancelWaitableTimer
FindResourceA
GetCommConfig
GetTimeFormatA
GlobalAddAtomA
GetFileType
HeapAlloc
RtlUnwind
GlobalCompact
SetNamedPipeHandleState
CreateDirectoryW
GetThreadPriority
GetSystemTimeAdjustment
FlushFileBuffers
LCMapStringW
CreateFileMappingW
SetEvent
SetFileTime
TlsGetValue
VerSetConditionMask
CreateWaitableTimerA
TryEnterCriticalSection
lstrlenA
SetHandleInformation
GlobalFlags
ReadFile
DeleteFileW
GetModuleFileNameW
GetTimeZoneInformation
UnlockFile
SetupComm
FindClose
GetLocalTime
SetUnhandledExceptionFilter
FormatMessageW
GetACP
AddAtomA
FoldStringW
GetVersion
GetUserDefaultUILanguage
FindResourceW
GetCPInfo
OpenFile
GetTempPathA
GetModuleHandleA
DeleteAtom
CreateFileMappingA
FindFirstChangeNotificationW
CompareStringA
SetThreadContext
HeapValidate
GetBinaryTypeW
DefineDosDeviceW
GetNumberFormatA
GetComputerNameExW
GlobalGetAtomNameA
GetPriorityClass
GetCommandLineW
GetCommModemStatus
SleepEx
OpenSemaphoreW
RemoveDirectoryA
AreFileApisANSI
GetModuleHandleW
GetCommProperties
GetVersionExW
TlsSetValue
lstrcmpW
LocalUnlock
EnumResourceNamesW
GetStringTypeExW
FindFirstFileW
GetFileAttributesExW
CreateSemaphoreW
VirtualAlloc
QueryPerformanceCounter
DeleteFileA
SetWaitableTimer
FileTimeToDosDateTime
GetAtomNameW
DisconnectNamedPipe
SearchPathW
FindResourceExA
GetCommandLineA
HeapUnlock
lstrcatA
UnhandledExceptionFilter
SystemTimeToFileTime
GetExitCodeThread
IsDBCSLeadByteEx
GlobalReAlloc
SetLastError
HeapSize
DuplicateHandle
EnumResourceLanguagesA
EnumSystemLocalesA
WaitForMultipleObjects
MoveFileW
SetThreadPriority
Exports
Exports
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.akpp Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.brafo Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.espt Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ls0 Size: 512B - Virtual size: 73B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sorp Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.clost Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.meosi Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mfo Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.porte Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ