Static task
static1
Behavioral task
behavioral1
Sample
6d90b4e08f5ae0c20393ae40e62b7b9744c2363fad9820e1c17a5ef65815fe30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d90b4e08f5ae0c20393ae40e62b7b9744c2363fad9820e1c17a5ef65815fe30.exe
Resource
win10v2004-20220812-en
General
-
Target
6d90b4e08f5ae0c20393ae40e62b7b9744c2363fad9820e1c17a5ef65815fe30
-
Size
357KB
-
MD5
1aaf128bc50c4df5107cdde450b0b1a6
-
SHA1
b2be7bcad2d1d9aa8126995508055c552d6fe2c2
-
SHA256
6d90b4e08f5ae0c20393ae40e62b7b9744c2363fad9820e1c17a5ef65815fe30
-
SHA512
7487decad2b37cab8b364aac80c977a5787720ea1de6b763c09b4d5ac96599473e54c2067841796488c9ff8c041ff5623459d7ac0c89749ce3d3e99fd9dbc564
-
SSDEEP
6144:QhyeDjPj01toTBJLaBhQtnu2WkAICU73NrP1HqEFZa7:beDjI1toTrs74Ca9P1BFY7
Malware Config
Signatures
Files
-
6d90b4e08f5ae0c20393ae40e62b7b9744c2363fad9820e1c17a5ef65815fe30.exe windows x86
62bbb23871e0c983ed1d262dc3c2d74a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_strcmpi
NtQueryInformationProcess
RtlTryEnterCriticalSection
NtAllocateVirtualMemory
RtlInitUnicodeString
NtOpenFile
NtCreateSection
NtMapViewOfSection
RtlAdjustPrivilege
NtQuerySystemInformation
NtDuplicateObject
NtQueryObject
NtReadVirtualMemory
NtWriteVirtualMemory
NtProtectVirtualMemory
sscanf
NtFreeVirtualMemory
_chkstk
_snprintf
_vsnprintf
strncmp
_strlwr
memset
memcpy
NtUnmapViewOfSection
NtClose
NtQueryInformationFile
NtTerminateThread
strstr
kernel32
CreateProcessA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
ExitProcess
VirtualQueryEx
VirtualAllocEx
GetTempFileNameA
IsBadWritePtr
SetLastError
LoadResource
SizeofResource
GetExitCodeThread
ExitThread
ResumeThread
Sleep
FlushInstructionCache
VirtualProtectEx
WriteProcessMemory
CreateMutexA
GetCurrentProcessId
OpenProcess
InitializeCriticalSection
GetModuleFileNameA
CreateFileA
CloseHandle
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
HeapValidate
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
MoveFileExA
FindFirstFileA
QueryDosDeviceA
GetLogicalDriveStringsA
WriteFile
SetFilePointer
GetFileSize
SetFileAttributesW
GetFileAttributesW
ReadFile
WideCharToMultiByte
MultiByteToWideChar
HeapReAlloc
IsBadReadPtr
OutputDebugStringA
GetCurrentThreadId
GetLastError
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
GetEnvironmentVariableA
SetEnvironmentVariableA
SuspendThread
SetThreadPriority
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
GetSystemInfo
CreateFileMappingA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ