Static task
static1
Behavioral task
behavioral1
Sample
a2028e0c6430e997bd015ad36cb29ea8d1f67c27f99f680925f3841f720719d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2028e0c6430e997bd015ad36cb29ea8d1f67c27f99f680925f3841f720719d2.exe
Resource
win10v2004-20220901-en
General
-
Target
a2028e0c6430e997bd015ad36cb29ea8d1f67c27f99f680925f3841f720719d2
-
Size
476KB
-
MD5
cd7875a02e8565d28cb68e2a719a0b8b
-
SHA1
80955a5dd8a443663c1e32e7b29d5e42b4948c4c
-
SHA256
a2028e0c6430e997bd015ad36cb29ea8d1f67c27f99f680925f3841f720719d2
-
SHA512
8687398fc7fdfbf4588fce328b1ff4a4bab02f797f3809a9b0a06e5111a0f7dcc8818fb201a29c63956affa00036ca3f0d00334998e1275dfde6063086ff24e9
-
SSDEEP
12288:orbClexUpTPfcA9aGkaey3s+YP3ebc4vG1E8OzSn:orbpUMraNcZ2YOVw
Malware Config
Signatures
Files
-
a2028e0c6430e997bd015ad36cb29ea8d1f67c27f99f680925f3841f720719d2.exe windows x86
3aaddf954076ae18d8b766de8f5b5667
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetForegroundWindow
GetKeyNameTextW
wvsprintfA
GetClipCursor
RegisterClassA
GetShellWindow
SetMenuItemInfoA
GetMenuItemInfoW
SetMenuItemInfoW
wsprintfA
RegisterClassExA
DdeDisconnect
SetWindowPos
ClientToScreen
PaintDesktop
RegisterDeviceNotificationA
GetMenu
EnumWindowStationsW
TranslateMDISysAccel
SendMessageA
MessageBoxExW
wininet
FindNextUrlCacheEntryA
shell32
SHFileOperationA
advapi32
CryptAcquireContextW
comctl32
InitCommonControlsEx
kernel32
VirtualFree
GetOEMCP
GetStringTypeW
GetDateFormatA
LCMapStringW
HeapSize
CloseHandle
GetStartupInfoA
GetProcAddress
SetLastError
ReadFile
TlsGetValue
MapViewOfFile
TlsSetValue
GetStdHandle
SleepEx
InitializeCriticalSection
ExitProcess
GetTimeZoneInformation
OpenMutexA
IsValidLocale
SetHandleCount
GetLastError
GetModuleFileNameA
GetStartupInfoW
RtlMoveMemory
SetFilePointer
CreateMutexA
GetTickCount
WideCharToMultiByte
EnumResourceTypesA
VirtualAlloc
WriteFile
HeapAlloc
EnterCriticalSection
GetCommandLineA
SetCurrentDirectoryA
GetCurrentThread
GetSystemTimeAsFileTime
TerminateProcess
FreeEnvironmentStringsW
TlsAlloc
CompareStringW
LCMapStringA
GetCurrentProcess
GetTimeFormatA
SetStdHandle
FreeEnvironmentStringsA
QueryPerformanceCounter
FlushFileBuffers
GetCommandLineW
GetShortPathNameA
MultiByteToWideChar
DeleteCriticalSection
GetEnvironmentStringsW
GetModuleHandleA
GetCurrentProcessId
IsBadWritePtr
GetLocaleInfoA
SetEnvironmentVariableA
HeapReAlloc
GetACP
GetUserDefaultLCID
GetStringTypeA
GetEnvironmentStrings
HeapDestroy
UnhandledExceptionFilter
GetDiskFreeSpaceExA
LoadLibraryA
RtlFillMemory
VirtualQuery
IsValidCodePage
GetCurrentThreadId
MoveFileExA
VirtualProtect
GetLocaleInfoW
CompareStringA
GetVersionExA
GetModuleFileNameW
HeapFree
OpenSemaphoreW
RtlUnwind
TlsFree
InterlockedExchange
HeapCreate
GetSystemInfo
LeaveCriticalSection
GetFileType
GetCPInfo
EnumSystemLocalesA
gdi32
FrameRgn
GetKerningPairs
SetWorldTransform
UpdateICMRegKeyW
GetLayout
CreateCompatibleBitmap
GetICMProfileW
GetArcDirection
LineDDA
AnimatePalette
ScaleWindowExtEx
GetDIBits
EnumICMProfilesW
SetBkColor
Sections
.text Size: 290KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ