Static task
static1
Behavioral task
behavioral1
Sample
6c177357b2483e430a31ba16307a4f04f0eed7d0a5e0486817fe9f0b33bcd458.exe
Resource
win10-20220414-en
General
-
Target
6c177357b2483e430a31ba16307a4f04f0eed7d0a5e0486817fe9f0b33bcd458
-
Size
379KB
-
MD5
b28e3b0c474d1f8f369292dbac1d0f58
-
SHA1
fc1a07d40a5bec6d87427fc10c1aede8cb659700
-
SHA256
6c177357b2483e430a31ba16307a4f04f0eed7d0a5e0486817fe9f0b33bcd458
-
SHA512
177af7143bd20a866ab1116b6251ff0675aaaa4a5a729d2a8ad48f38f5c109196e9331576ccc626889558c9ac2ead5d8d0c49bfe9044a7d5c0fe0e8216c6c923
-
SSDEEP
6144:vr/1Tc271YibvF0IbEZDC3P34M0Pjuh0PZrqnSd8PS/hhL8QTfWc71AT0C:DRc2hnbd0IaDCgxnySd8PS/hyQThGgC
Malware Config
Signatures
Files
-
6c177357b2483e430a31ba16307a4f04f0eed7d0a5e0486817fe9f0b33bcd458.exe windows x86
0c704cf6db9a534550072c2f00d6073c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
FindResourceA
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WriteConsoleOutputCharacterW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetModuleHandleExA
GetConsoleAliasExesA
SetComputerNameExA
GetDriveTypeW
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
WritePrivateProfileSectionA
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetProfileSectionA
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
ConnectNamedPipe
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleOutputA
GetConsoleAliasExesW
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetDriveTypeA
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
IsProcessInJob
CopyFileW
AssignProcessToJobObject
GetCalendarInfoW
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
lstrcatA
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
GetStringTypeExA
DeactivateActCtx
GetNamedPipeHandleStateW
GetConsoleAliasesW
ReleaseActCtx
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
SetComputerNameA
VerLanguageNameW
GlobalGetAtomNameA
BuildCommDCBW
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
GetProfileStringA
VirtualLock
HeapLock
GetCommMask
HeapWalk
GetTapeParameters
FoldStringW
SetSystemTime
GlobalWire
GetModuleFileNameA
GetPrivateProfileSectionNamesA
FindNextFileA
EnumDateFormatsA
FindFirstChangeNotificationA
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
OpenSemaphoreW
EndUpdateResourceA
GetVersionExA
GetVersion
DeleteFileW
GetCurrentProcessId
DeleteAtom
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
SuspendThread
lstrcpyA
SetUnhandledExceptionFilter
DeleteFileA
HeapValidate
IsBadReadPtr
RaiseException
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringW
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
CloseHandle
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 169KB - Virtual size: 425KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yib Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.duyoga Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fofe Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ