Static task
static1
Behavioral task
behavioral1
Sample
2f23178c48d631975cfc9b46e0c86679db7bd9479954cbe5b098b7637c486604.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f23178c48d631975cfc9b46e0c86679db7bd9479954cbe5b098b7637c486604.exe
Resource
win10v2004-20220901-en
General
-
Target
2f23178c48d631975cfc9b46e0c86679db7bd9479954cbe5b098b7637c486604
-
Size
205KB
-
MD5
3f2b1014dce093e25a372605b51a6b76
-
SHA1
57ed72eb5b584b3e425f41c05f2abb63ce140de6
-
SHA256
2f23178c48d631975cfc9b46e0c86679db7bd9479954cbe5b098b7637c486604
-
SHA512
d34463aad0273870375ba0f0a6b182162ddbb79cc0a722235ebb1d32afde163cc8e33f0cf734fb4d473fc8ac7d5371127ee90f7e9926de43a89f6e35ddd934d4
-
SSDEEP
3072:J2nwqQvQ4MvM/BKc8M0mDr5C1bQuGhwhGEjE+8fV3SKPZAufKmkVdFDXN12E21:V15sDmDrkQuoMG6EhfsCZAuimk1N4z1
Malware Config
Signatures
Files
-
2f23178c48d631975cfc9b46e0c86679db7bd9479954cbe5b098b7637c486604.exe windows x86
9f662496bc4e7dddbc28c231544a23f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoW
GetStartupInfoA
GetModuleHandleA
msvcrt
_fsopen
memcpy
__p__fmode
_time64
_getcwd
_endthread
_atoldbl
wcscmp
_stricoll
tmpnam
iswspace
_XcptFilter
iswupper
perror
wctomb
cosh
_adjust_fdiv
_execlpe
__setusermatherr
_wtmpnam
_wcsicoll
_acmdln
_heapused
_wctime
_putwch
_strdup
_ungetwch
__set_app_type
_endthreadex
_outpd
iswlower
_getdiskfree
wcscat
_sopen
_controlfp
_except_handler3
_mbsnbicmp
_mbcasemap
setlocale
_lrotr
_mbsnbcmp
_exit
_initterm
__p__commode
_fgetwchar
wcsncat
_ismbstrail
__getmainargs
exit
strcoll
_mbsnextc
Sections
.text Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ