Static task
static1
Behavioral task
behavioral1
Sample
6e2a8382686bc4b669c41f40ea88660bc665708551b3a31388e1b442fde15ae7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e2a8382686bc4b669c41f40ea88660bc665708551b3a31388e1b442fde15ae7.exe
Resource
win10v2004-20220812-en
General
-
Target
6e2a8382686bc4b669c41f40ea88660bc665708551b3a31388e1b442fde15ae7
-
Size
723KB
-
MD5
dcdd7cd08ba35aa22520c3e521255493
-
SHA1
400fb04754d0b0b52c2dfe574532299de2240813
-
SHA256
6e2a8382686bc4b669c41f40ea88660bc665708551b3a31388e1b442fde15ae7
-
SHA512
424e988d99af1b7746b8e447d5a42a32a651a3c6bf4a7d1a22f82e117023a95bf9dd116bf720c327ae9a6a2355b37a81eab5b43de22aaed93f75071bf39b5378
-
SSDEEP
12288:PRHyGCWpebZmc/qcFqqWE1YPARL8p2YYqKRx+JMYOVsYsos+Z4F8S0iE7Da30cGg:PRSnWcmRE06LY2YYNmJMXV/Ns+el0/En
Malware Config
Signatures
Files
-
6e2a8382686bc4b669c41f40ea88660bc665708551b3a31388e1b442fde15ae7.exe windows x86
0f8e06ed2327bfbffebe34ef3e32351c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
GetCommandLineA
GetLastError
GetVersion
GetCurrentThreadId
GetModuleHandleA
ExitProcess
GetCurrentThread
VirtualAlloc
GetOEMCP
FindResourceA
VirtualFree
UnmapViewOfFile
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
HeapSize
WideCharToMultiByte
LockResource
lstrlenW
GlobalAlloc
GetEnvironmentStringsW
HeapCreate
InterlockedIncrement
CreateFileA
CreateEventA
Sleep
GlobalLock
FindFirstFileW
CompareStringA
FindFirstFileA
lstrcmpA
CompareStringW
GetSystemInfo
GetProcAddress
DeleteFileA
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
SetEvent
LoadLibraryW
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
CreateMutexA
MultiByteToWideChar
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
TlsGetValue
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
WriteFile
GetStringTypeA
GetCPInfo
SetStdHandle
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
ReleaseMutex
user32
GetFocus
GetClientRect
SystemParametersInfoA
GetKeyState
DialogBoxParamA
MessageBoxA
EndDialog
LoadIconA
GetDlgItem
GetSystemMetrics
KillTimer
BeginPaint
SetFocus
DispatchMessageA
CreateWindowExA
EnableMenuItem
LoadStringA
TranslateMessage
PeekMessageA
EnableWindow
ShowWindow
UpdateWindow
DestroyWindow
GetCursorPos
GetDC
IsWindow
SetWindowPos
PostQuitMessage
Sections
.text Size: 675KB - Virtual size: 1001KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ