Static task
static1
Behavioral task
behavioral1
Sample
6db88a250d1ede48e747353120bd0bf8a2586019e094be715eb1111c8c0ab3cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6db88a250d1ede48e747353120bd0bf8a2586019e094be715eb1111c8c0ab3cf.exe
Resource
win10v2004-20220812-en
General
-
Target
6db88a250d1ede48e747353120bd0bf8a2586019e094be715eb1111c8c0ab3cf
-
Size
792KB
-
MD5
6f88f0f1ecb90549357b2abb30963dc0
-
SHA1
2423062d826bca4ae544697011220687da23faf8
-
SHA256
6db88a250d1ede48e747353120bd0bf8a2586019e094be715eb1111c8c0ab3cf
-
SHA512
2135123abe307c90efc2cc3e2ccae14595eddd0ff85ffeff6685d11fdb00f3e2514c57220b7f73302321ff963c8307b80be15acba41fd372928ce04d2c34396d
-
SSDEEP
24576:hMqzuYMUzmU47j8qhb8xkDCel5b8qaqb+Cg+:aguNImUyj8qaxkDCoaq7k
Malware Config
Signatures
Files
-
6db88a250d1ede48e747353120bd0bf8a2586019e094be715eb1111c8c0ab3cf.exe windows x86
67a403c281c447704bc029228cae5c93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
SizeofResource
FindResourceExA
TerminateProcess
OpenProcess
GetPrivateProfileStringA
lstrcmpiA
GetExitCodeProcess
WritePrivateProfileStringA
GlobalMemoryStatus
LoadLibraryW
LoadLibraryExW
FormatMessageA
LeaveCriticalSection
EnterCriticalSection
InterlockedCompareExchange
lstrlenW
LockResource
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetUserDefaultLangID
FreeResource
GlobalMemoryStatusEx
GetCurrentProcessId
ProcessIdToSessionId
GetModuleFileNameA
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
GetTempFileNameA
GetTempPathA
CreateProcessA
LocalFree
GetVolumeInformationA
FindFirstFileA
FindNextFileA
FindClose
LocalAlloc
SetLastError
CloseHandle
lstrlenA
GetProcessHeap
HeapAlloc
HeapFree
GetLogicalDriveStringsA
GetDriveTypeA
CreateFileA
DeviceIoControl
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Sleep
LoadLibraryA
GetTickCount
GetShortPathNameA
DeleteFileA
GetCurrentProcess
LoadLibraryExA
GetProcAddress
FreeLibrary
SetErrorMode
GetModuleHandleA
WaitForSingleObject
ReleaseMutex
SetEvent
CreateEventA
CreateMutexA
GetLastError
GetLocaleInfoW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
WriteFile
SetUnhandledExceptionFilter
ExitProcess
RtlUnwind
GetFileAttributesA
HeapReAlloc
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
GetOEMCP
GetCPInfo
TlsAlloc
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
FatalAppExitA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
ReadFile
VirtualQuery
HeapSize
user32
FindWindowExA
FindWindowA
IsIconic
ShowWindow
SetForegroundWindow
GetForegroundWindow
BringWindowToTop
ReleaseDC
CharUpperA
GetSystemMetrics
GetUserObjectSecurity
SetUserObjectSecurity
wsprintfA
UnregisterClassA
ExitWindowsEx
GetDesktopWindow
MessageBoxA
GetDC
GetLastActivePopup
gdi32
GetDeviceCaps
advapi32
InitializeSecurityDescriptor
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyA
ImpersonateLoggedOnUser
CreateProcessAsUserW
CreateProcessAsUserA
RevertToSelf
DuplicateTokenEx
SetTokenInformation
RegOpenKeyExW
RegQueryValueExW
RegSetValueExA
LookupAccountSidA
LookupAccountNameA
GetSidLengthRequired
InitializeSid
IsValidSecurityDescriptor
AllocateAndInitializeSid
FreeSid
GetSecurityDescriptorGroup
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
CopySid
GetFileSecurityA
SetFileSecurityA
RegGetKeySecurity
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
RegSetKeySecurity
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
ShellExecuteExA
FindExecutableA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringByteLen
SysFreeString
SysAllocString
SetErrorInfo
VariantInit
VariantClear
VariantChangeType
GetErrorInfo
CreateErrorInfo
Sections
.text Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE