Static task
static1
Behavioral task
behavioral1
Sample
6edf9c5ba943bcfd7a4cb86f8ce0c2dc92ec8bde25ef4301c4341e552a181999.exe
Resource
win10-20220414-en
General
-
Target
6edf9c5ba943bcfd7a4cb86f8ce0c2dc92ec8bde25ef4301c4341e552a181999
-
Size
848KB
-
MD5
0577a3b5ff4b84c5fc3b7d83a45ae8ba
-
SHA1
4f553cf6da9836af03fd0f076969f5b42ad08d23
-
SHA256
6edf9c5ba943bcfd7a4cb86f8ce0c2dc92ec8bde25ef4301c4341e552a181999
-
SHA512
2f73bbf997520e9d8f393bb0f3cb2784d072174dc05aeb1e817f278210758cd6454331a1e110a6b4c0e0e018bc6baa540087d57d0538b563b7b859a784679cce
-
SSDEEP
24576:7JQNe7r4zJuVziSOOh9PubNgTxTGH0tEFLS9:7JV3OODuaxTcv1S
Malware Config
Signatures
Files
-
6edf9c5ba943bcfd7a4cb86f8ce0c2dc92ec8bde25ef4301c4341e552a181999.exe windows x86
db57d5e3d04b9a257784f752aaee46da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
GetConsoleAliasesLengthA
GetUserDefaultLangID
LoadLibraryW
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
SetLastError
GetProcAddress
FreeLibrary
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
OpenEventA
OpenJobObjectW
GetModuleFileNameA
GetCommTimeouts
GetShortPathNameW
EnumCalendarInfoExA
LCMapStringW
CreateFileW
RaiseException
FindResourceA
GetConsoleAliasesLengthW
SetDefaultCommConfigA
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
HeapCreate
HeapFree
HeapAlloc
GetModuleFileNameW
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
RtlUnwind
WriteConsoleW
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
CreateRestrictedToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 653KB - Virtual size: 652KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.deya Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.niy Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ciy Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.surik Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ