Static task
static1
Behavioral task
behavioral1
Sample
f2e44fb7bf83c1962770d49293474d33cb1838422781eded85600ebd7d5e182f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2e44fb7bf83c1962770d49293474d33cb1838422781eded85600ebd7d5e182f.exe
Resource
win10v2004-20221111-en
General
-
Target
f2e44fb7bf83c1962770d49293474d33cb1838422781eded85600ebd7d5e182f
-
Size
202KB
-
MD5
2d32bb3d2a5336b2991b5a1b4d2db13f
-
SHA1
153e285e1ecdb7557266802f65b44da9325f35b5
-
SHA256
f2e44fb7bf83c1962770d49293474d33cb1838422781eded85600ebd7d5e182f
-
SHA512
244d655ed25171c3d9ac3e817198d88e6d6a1062ad074bdbb6ecc283887ac897199cdb6571ee89249e57aa297fe3bb86eb6aa18f7aa4c30e1a136450335efa80
-
SSDEEP
6144:9BdMOv5SuYP/CcNmRmCG9aSebFjhQmarNPemxY:9J5+dNSmTaplQxBxY
Malware Config
Signatures
Files
-
f2e44fb7bf83c1962770d49293474d33cb1838422781eded85600ebd7d5e182f.exe windows x86
6ebead13f52b934afadd6ada0a580006
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryW
CreateEventA
GetFullPathNameA
GetFileSize
ConnectNamedPipe
ExpandEnvironmentStringsW
GetStartupInfoW
lstrcpynA
GetLocalTime
GetFileAttributesA
AddAtomA
GetEnvironmentStringsW
GetCurrentProcessId
FileTimeToSystemTime
lstrcpyn
GetFileTime
ReplaceFileW
GetCurrentThreadId
SetComputerNameW
lstrcmpi
ExitProcess
SuspendThread
CreateDirectoryW
CreateMutexW
ReadDirectoryChangesW
CreateFileA
GetLogicalDriveStringsW
lstrcmpiW
FindAtomW
Sleep
CreateThread
EndUpdateResourceW
CopyFileExW
EndUpdateResourceA
QueryPerformanceFrequency
GetOEMCP
GetModuleHandleA
GetTempPathW
lstrcmpW
GetProcAddress
lstrlenW
LoadResource
user32
BringWindowToTop
ActivateKeyboardLayout
ShowWindow
RegisterWindowMessageW
CharLowerA
TrackPopupMenu
SetWindowRgn
GetDC
CreateIcon
UnregisterClassW
MessageBeep
LoadImageW
RegisterWindowMessageA
FrameRect
LoadIconW
InsertMenuA
DefWindowProcW
GetDC
gdi32
GetTextExtentPointW
OffsetWindowOrgEx
GetDeviceCaps
GetViewportOrgEx
EnumFontsW
GetLogColorSpaceA
GetSystemPaletteEntries
RealizePalette
GetClipBox
SetDCBrushColor
FloodFill
CloseMetaFile
Escape
AngleArc
SetColorSpace
PlayEnhMetaFile
advapi32
RegSaveKeyA
RegCreateKeyW
RegQueryInfoKeyW
shell32
ExtractIconA
SHGetSpecialFolderLocation
StrRChrW
ExtractIconExA
StrRStrW
StrRChrIA
DuplicateIcon
StrNCmpIA
setupapi
CM_Get_Class_Name_ExA
InstallHinfSectionA
CM_Disable_DevNode
SetupDiSetClassInstallParamsA
SetupAddSectionToDiskSpaceListA
ws2_32
getprotobynumber
recv
winmm
midiInReset
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.KsT Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JsaqF Size: 512B - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CflZ Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XGYQ Size: 1KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.igrtL Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RhnrqI Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kYI Size: 1024B - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ