Static task
static1
Behavioral task
behavioral1
Sample
b2667dde72a6097b4eddc1f2c54458f530a557416719db468e579b496747df47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2667dde72a6097b4eddc1f2c54458f530a557416719db468e579b496747df47.exe
Resource
win10v2004-20220812-en
General
-
Target
b2667dde72a6097b4eddc1f2c54458f530a557416719db468e579b496747df47
-
Size
1.5MB
-
MD5
c39a464d9598c0f207b4df0235bf0494
-
SHA1
ecf372c6751548a7e71de82587f30594c0b7f14f
-
SHA256
b2667dde72a6097b4eddc1f2c54458f530a557416719db468e579b496747df47
-
SHA512
a621f2c2f0867fb85a147e7ff9b65d8cb229d37af658f9413e97731c86a207d12ef5371db366109d877ef359d3a5229f4305602a367798188821f29f4493cacb
-
SSDEEP
24576:uY4r0Hi1gVIlKLJph155XOhzIvRGBufaTuccVvrsk7jdZBLtRDGwyN4j32BW:uPCOlK1pR5XZvRfyMzsk1XtRV+4j3t
Malware Config
Signatures
Files
-
b2667dde72a6097b4eddc1f2c54458f530a557416719db468e579b496747df47.exe windows x86
f213ca9c2090bb65a377dd4d9eb26dca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
CloseHandle
GetEnvironmentVariableA
TerminateProcess
lstrcpyn
GetProcessHeap
GetModuleHandleA
ExitProcess
WriteProcessMemory
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
WriteFile
CreateFileA
GetStartupInfoA
GetTickCount
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
RtlMoveMemory
HeapAlloc
LocalSize
FlushFileBuffers
GetCommandLineA
GetVersion
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
GetProcAddress
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
LCMapStringA
LCMapStringW
RaiseException
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
LoadLibraryA
SetFilePointer
GetStringTypeA
GetStringTypeW
SetStdHandle
user32
wsprintfA
MessageBoxA
advapi32
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
CryptGetHashParam
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE