Static task
static1
Behavioral task
behavioral1
Sample
6b865be1a32b9fc5c673561416fd5459e6da5b6727cea81b97cedf11cacc10a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b865be1a32b9fc5c673561416fd5459e6da5b6727cea81b97cedf11cacc10a0.exe
Resource
win10v2004-20220812-en
General
-
Target
6b865be1a32b9fc5c673561416fd5459e6da5b6727cea81b97cedf11cacc10a0
-
Size
344KB
-
MD5
f2348c8aba3c1068729a27ab20dfec45
-
SHA1
19b7eddc5daa0cd59280d5ef966729879b236692
-
SHA256
6b865be1a32b9fc5c673561416fd5459e6da5b6727cea81b97cedf11cacc10a0
-
SHA512
e0417261847780f504ca46b4c55dfb807f860f0a15a501961257915c09555db531e91b7496b881a76b4e145933c07497f70f5ba098f3744cd09046d4451e0436
-
SSDEEP
6144:+H/yeH+aPkBnCVxjQVvS1CktlDtpttm5VeKCnk:+f/H+a8BnCVxNm5kJk
Malware Config
Signatures
Files
-
6b865be1a32b9fc5c673561416fd5459e6da5b6727cea81b97cedf11cacc10a0.exe windows x86
d141d19588c88c2435c297e919fe4170
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdipDisposeImage
GdipFree
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipGetImageHeight
GdipGetImageWidth
GdiplusStartup
GdipAlloc
GdipCloneImage
mfc42u
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4621
ord4419
ord795
ord641
ord567
ord324
ord825
ord2294
ord4229
ord3621
ord2406
ord472
ord283
ord2746
ord4124
ord5679
ord861
ord1197
ord6195
ord2810
ord800
ord858
ord540
ord4704
ord6451
ord5871
ord4470
ord2371
ord6211
ord3658
ord2567
ord4390
ord3569
ord609
ord6193
ord3605
ord656
ord3871
ord4667
ord823
ord538
ord535
ord1634
ord1165
ord4197
ord5568
ord2977
ord941
ord3332
ord3806
ord940
ord537
ord4272
ord2755
ord942
ord6868
ord3566
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord3733
ord561
ord815
ord5714
ord2078
ord2613
ord1131
ord860
ord2717
ord2914
ord1202
ord3592
ord1143
ord4155
ord2858
ord755
ord470
ord4219
ord1921
ord4270
ord640
ord2855
ord1633
ord323
ord613
ord289
ord6920
ord925
ord551
ord4273
ord6655
ord2756
ord4198
ord4199
ord6865
ord956
ord356
ord668
ord3173
ord3176
ord4053
ord1569
ord2762
ord922
ord859
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4847
ord4370
ord5261
ord3716
ord4418
ord3397
ord5286
ord1768
ord6051
ord1808
ord2910
ord2773
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
_controlfp
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_CIfmod
_CIpow
_CxxThrowException
isspace
isdigit
isalpha
_adjust_fdiv
_errno
fseek
__RTDynamicCast
_filelength
fread
time
srand
strrchr
wcsncpy
free
_purecall
swscanf
_ftol
rand
wcslen
toupper
_wfopen
fwrite
fclose
malloc
wcscmp
__setusermatherr
isupper
_initterm
_wcsicmp
wcsrchr
__CxxFrameHandler
sprintf
kernel32
DeleteFileW
GetCurrentProcessId
WideCharToMultiByte
GlobalAlloc
Sleep
CopyFileW
GetLongPathNameW
GetModuleFileNameA
CloseHandle
GetVersionExW
lstrcmpW
lstrlenW
lstrlenA
WaitForSingleObject
GetProcAddress
LoadLibraryW
FreeLibrary
InterlockedDecrement
lstrcmpiW
GetStartupInfoW
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcess
GetLastError
LocalFree
GetTickCount
GetModuleFileNameW
GetModuleHandleW
user32
SetCursorPos
SetRect
mouse_event
ShowWindow
IsIconic
PostMessageW
IntersectRect
MessageBoxW
IsRectEmpty
EqualRect
SystemParametersInfoW
TranslateMessage
DispatchMessageW
PeekMessageW
ScreenToClient
GetKeyNameTextW
LoadIconW
EmptyClipboard
AppendMenuW
GetSystemMenu
DrawIcon
GetWindowTextW
EnumWindows
keybd_event
MapVirtualKeyW
OpenClipboard
CloseClipboard
LoadImageW
GetDC
ReleaseDC
SetForegroundWindow
KillTimer
ExitWindowsEx
GetSystemMetrics
SendMessageW
SetClipboardData
EnableWindow
GetWindowRect
GetCursorPos
PtInRect
UnregisterHotKey
RegisterHotKey
SetTimer
GetClientRect
IsWindowVisible
InvalidateRect
GetClassNameW
GetClipboardData
gdi32
GetStockObject
DeleteDC
GetCurrentObject
SetBitmapBits
GetBitmapBits
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateDCW
GetDeviceCaps
SelectPalette
RealizePalette
GetDIBits
SelectObject
Rectangle
GetObjectW
advapi32
LookupPrivilegeValueA
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteW
SHGetSpecialFolderPathW
ole32
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
OleRun
CoTaskMemAlloc
CoTaskMemFree
oleaut32
GetErrorInfo
VariantChangeType
VariantClear
SysFreeString
SysAllocString
VariantInit
msvcp60
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
shlwapi
PathFileExistsW
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ