Static task
static1
Behavioral task
behavioral1
Sample
2b5e98babec23e9adbc729afd02b52088d0be2dc153b910c0ef0b10093661fa2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b5e98babec23e9adbc729afd02b52088d0be2dc153b910c0ef0b10093661fa2.exe
Resource
win10v2004-20220901-en
General
-
Target
2b5e98babec23e9adbc729afd02b52088d0be2dc153b910c0ef0b10093661fa2
-
Size
929KB
-
MD5
301642ed8377019f41896e22e809a290
-
SHA1
8f144526efd89acd77bf0fb03bc6b9c6e69e47e1
-
SHA256
2b5e98babec23e9adbc729afd02b52088d0be2dc153b910c0ef0b10093661fa2
-
SHA512
fae39b4a5a298b985f39cfff8bb313027b7e977fabc343a0f2d73eef6bc0acb2e205352a068e6cf0e292d4c24df328c9d2f160a1755b2c1ed0024af22405d92d
-
SSDEEP
3072:M++YgG4jF0gtALAXLi9CaBl5gIP3UsmeYEgtFU:pRmICwWebb
Malware Config
Signatures
Files
-
2b5e98babec23e9adbc729afd02b52088d0be2dc153b910c0ef0b10093661fa2.exe windows x86
1bebe70dd9f18c40187b0e74b0af3420
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
BuildCommDCBW
FormatMessageA
FormatMessageW
GetCurrentProcess
GetNumberFormatW
GetProfileStringW
GetTempPathW
GetWindowsDirectoryW
LocalAlloc
LocalFree
MoveFileW
QueryDosDeviceW
ReadConsoleInputW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitCommEvent
WriteProfileStringW
lstrcatW
lstrcmpiW
lstrcpyW
GetProcAddress
GetModuleHandleA
ExitProcess
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
IsDebuggerPresent
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
SetFilePointer
SetHandleCount
GetFileType
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCurrentProcessId
GetFileAttributesW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
RtlUnwind
GetLocaleInfoA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
GetFileAttributesA
RaiseException
FlushFileBuffers
CreateFileA
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
rpcrt4
NdrByteCountPointerBufferSize
RpcEpResolveBinding
I_RpcParseSecurity
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 528KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE