Static task
static1
Behavioral task
behavioral1
Sample
2f0410254748841d62f89bead9947c95cbcf57cc86fbec6663a1e7bee254ff20.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2f0410254748841d62f89bead9947c95cbcf57cc86fbec6663a1e7bee254ff20.exe
Resource
win10v2004-20220901-en
General
-
Target
2f0410254748841d62f89bead9947c95cbcf57cc86fbec6663a1e7bee254ff20
-
Size
35KB
-
MD5
b3b7c25808b5dfdcfd3e5f420d169d30
-
SHA1
45a4d7c6dc05c1aab13805d26fee15ebe1fb81de
-
SHA256
2f0410254748841d62f89bead9947c95cbcf57cc86fbec6663a1e7bee254ff20
-
SHA512
b96fbf140e48d1ceb789bd237ce1994150779caf96c54af31e42714b6268832362a5c19d109099bc72bee6260a75498921fb652213ac62550d2e78264f10323e
-
SSDEEP
768:ERnTaAqXAMbilSNSnRc2gTTjiMIckooESEZZgEOXN4VGuFb6m+0r:4nTa+IhUv0jiSoEVZgzXmV7x9+0r
Malware Config
Signatures
Files
-
2f0410254748841d62f89bead9947c95cbcf57cc86fbec6663a1e7bee254ff20.exe windows x86
ae7ed7b828863260175738721aa98c2d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
GetMenuStringW
OpenClipboard
DestroyIcon
GetActiveWindow
UnregisterClassA
LoadIconA
DestroyMenu
TrackPopupMenu
GetClientRect
ReleaseDC
SetWindowPos
InflateRect
RegisterClassW
LoadStringW
SendMessageW
CheckMenuItem
GetSubMenu
CreateWindowExW
SetActiveWindow
PostMessageW
GetCursorPos
SetWindowTextW
AllowSetForegroundWindow
GetMenu
MoveWindow
GetWindowLongW
SetCapture
GetWindowTextLengthA
PtInRect
kernel32
GetModuleHandleW
SetUnhandledExceptionFilter
WriteFile
SetFilePointer
LoadLibraryA
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
GetFileSize
EnterCriticalSection
ExitProcess
InterlockedExchange
GetVersionExA
GetModuleFileNameW
RaiseException
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
TlsGetValue
TryEnterCriticalSection
GetFileSizeEx
FlushFileBuffers
GetCurrentThreadId
CloseHandle
FreeLibrary
GetACP
WideCharToMultiByte
WaitForSingleObject
InterlockedCompareExchange
Sleep
SetLastError
GetLastError
GetModuleHandleA
GetProcAddress
TlsSetValue
InterlockedIncrement
LocalFree
CreateThread
HeapFree
InitializeCriticalSection
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FindClose
GetStdHandle
ReadFile
MultiByteToWideChar
DeleteCriticalSection
GetFileType
GetTickCount
LeaveCriticalSection
InterlockedDecrement
SetEvent
FreeLibraryAndExitThread
TerminateProcess
SetFilePointerEx
WaitForSingleObjectEx
GetVersionExW
HeapAlloc
CreateFileA
IsDebuggerPresent
CreateFileW
GetCurrentProcess
shlwapi
PathRemoveExtensionW
SHGetValueW
PathStripToRootW
PathFileExistsA
PathFindExtensionA
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecA
PathFileExistsW
StrStrIA
PathRelativePathToW
SHDeleteValueW
PathCanonicalizeW
PathIsRootW
StrStrIW
StrCmpW
PathIsRelativeW
StrCmpIW
StrCmpNW
PathAddBackslashA
PathAppendW
PathRemoveFileSpecW
PathAppendA
PathAddBackslashW
SHDeleteKeyW
StrToIntExW
AssocQueryStringW
PathRenameExtensionW
SHCreateStreamOnFileW
PathIsURLW
PathRemoveBlanksW
StrToIntW
PathCommonPrefixW
PathIsDirectoryW
PathCombineW
StrCmpNIW
PathFindFileNameA
PathRemoveBackslashW
PathStripPathW
StrStrW
PathIsUNCW
PathIsFileSpecW
setupapi
SetupQueryInfFileInformationA
msvcrt
_onexit
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
strlen
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ