Static task
static1
Behavioral task
behavioral1
Sample
2d7aeaad74876e44461daa2c9a39316bc510de65efe30f3d6cc167638876beee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d7aeaad74876e44461daa2c9a39316bc510de65efe30f3d6cc167638876beee.exe
Resource
win10v2004-20221111-en
General
-
Target
2d7aeaad74876e44461daa2c9a39316bc510de65efe30f3d6cc167638876beee
-
Size
5.1MB
-
MD5
26e0c1cbfb41b3bfe3877bf293bc590c
-
SHA1
1398dd9ef5fee8d25a5567dbb8e342720a1ca9a9
-
SHA256
2d7aeaad74876e44461daa2c9a39316bc510de65efe30f3d6cc167638876beee
-
SHA512
2045881f551937fc559b368a3d0c328b788de6da2538b94c2ee3d6f6594ca2a0c195ee3ed04cf0b6df2f6e099fa04259dc00751cdcaf1027024bdfd478b77998
-
SSDEEP
98304:/xznTxee0cx4rVcWwmuMvpmapJOBL2feXhIxU2TaiQl9RCmob7I2Q72UhqPwf:/xznTg8ccW5ukZJQL2fUhEOjAm+IxqPW
Malware Config
Signatures
Files
-
2d7aeaad74876e44461daa2c9a39316bc510de65efe30f3d6cc167638876beee.exe windows x86
2222c3687cf005248d2d30a337861429
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetThreadLocale
GetCurrentProcess
FindClose
FindFirstFileA
CreateFileA
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
ExitThread
CreateThread
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
CreateFileW
FindNextFileA
IsBadReadPtr
CreateDirectoryA
GetSystemDirectoryA
GetComputerNameA
WriteFile
ReadFile
DeleteFileA
MoveFileA
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
CreateEventA
SetEvent
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetVersionExA
SizeofResource
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LockResource
FreeResource
OpenProcess
GetCurrentProcessId
GetLogicalDriveStringsA
QueryDosDeviceA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
TerminateProcess
WaitForSingleObject
VirtualAlloc
GetModuleFileNameA
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
WriteProcessMemory
SetThreadContext
ResumeThread
CloseHandle
VirtualFree
WriteProfileStringA
GetLocalTime
HeapDestroy
GetProfileStringA
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ReleaseDC
GetDC
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
LoadStringA
MessageBoxA
SendMessageA
PostMessageA
EnableWindow
GetClientRect
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
SetMenuItemBitmaps
LoadBitmapA
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
SetActiveWindow
GetActiveWindow
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PtVisible
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateGuid
CLSIDFromString
oleaut32
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysFreeString
VariantTimeToSystemTime
SysAllocString
psapi
GetProcessImageFileNameA
ws2_32
ioctlsocket
select
getsockopt
WSACreateEvent
WSAWaitForMultipleEvents
WSACloseEvent
WSASetLastError
WSAResetEvent
WSAEnumNetworkEvents
htonl
WSAStartup
WSACleanup
sendto
recvfrom
closesocket
bind
inet_addr
htons
socket
ntohl
ntohs
WSAGetLastError
connect
send
getpeername
setsockopt
WSAEventSelect
recv
Sections
.text Size: 316KB - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ