Static task
static1
Behavioral task
behavioral1
Sample
2d5230d6ceaa896bb1174f6a63c5d0bb3575a7e1d8f2cd5d736b3b70d2c5ba71.exe
Resource
win10-20220901-en
General
-
Target
2d5230d6ceaa896bb1174f6a63c5d0bb3575a7e1d8f2cd5d736b3b70d2c5ba71
-
Size
2.2MB
-
MD5
b92cac16cbe9680b0cb5743e4ef1e65c
-
SHA1
de49c69c1bcb0d768a38e73125959efcfa206752
-
SHA256
2d5230d6ceaa896bb1174f6a63c5d0bb3575a7e1d8f2cd5d736b3b70d2c5ba71
-
SHA512
ea58e3c37d08c4a9c70d296734c868a23f1fa0f1f51db9f19def35a476af29e6f666106ad463b5f4130c012d62475b857bb840c9be9d66d43c061b82743b97cd
-
SSDEEP
49152:PgoVs6UXp2kJNA9+8cF4hfe/Cn8bL/wqBrjzty06v:1Uow6cG0
Malware Config
Signatures
Files
-
2d5230d6ceaa896bb1174f6a63c5d0bb3575a7e1d8f2cd5d736b3b70d2c5ba71.exe windows x64
7460895f9377dd3882571b543810aeae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryA
GlobalAlloc
CloseHandle
SetFileAttributesA
GlobalLock
GetConsoleWindow
GlobalUnlock
GetFileAttributesA
HeapSize
CreateFileW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLastError
CopyFileA
Sleep
CreateMutexA
WriteConsoleW
GetModuleFileNameA
GetOEMCP
GetACP
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
CompareStringEx
GetCPInfo
GetStringTypeW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RtlUnwind
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
HeapReAlloc
HeapAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
user32
ShowWindow
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyA
shell32
ShellExecuteA
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.xObf Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE