Static task
static1
Behavioral task
behavioral1
Sample
6a140517f9d7cefff7ae71a44c4b7b82a90769d33f3f306b36efcd60fa33db30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a140517f9d7cefff7ae71a44c4b7b82a90769d33f3f306b36efcd60fa33db30.exe
Resource
win10v2004-20220812-en
General
-
Target
6a140517f9d7cefff7ae71a44c4b7b82a90769d33f3f306b36efcd60fa33db30
-
Size
352KB
-
MD5
7cdd028d12da49b5647bf883da351b4b
-
SHA1
bdabf3c187150c6de91431ea9c91591eb1759595
-
SHA256
6a140517f9d7cefff7ae71a44c4b7b82a90769d33f3f306b36efcd60fa33db30
-
SHA512
0aa2f2c6b82e4e56096bf5a9293cadf64c4c7fe4dd5e12b1f2a38bc870121204cbadb47591c361e8caa065b48441adcca38ac89482d0289f88752e6d735da89c
-
SSDEEP
6144:EnsXfdbNJRd2TD1SiU0jZg+lAtsQpB7DH1guHFY47Pvk:EsXwJFjd1OD1td7
Malware Config
Signatures
Files
-
6a140517f9d7cefff7ae71a44c4b7b82a90769d33f3f306b36efcd60fa33db30.exe windows x86
834e80e147d160405d9933cbb5dc13aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetImageCount
DrawInsert
ImageList_GetDragImage
ImageList_GetIcon
ImageList_AddMasked
ImageList_SetIconSize
CreateToolbarEx
CreateToolbar
CreateStatusWindowW
InitMUILanguage
CreateStatusWindow
ImageList_Create
ImageList_BeginDrag
InitCommonControlsEx
ImageList_DragEnter
ImageList_SetBkColor
gdi32
SetColorSpace
EnumMetaFile
CreatePenIndirect
GetCharWidthFloatA
GetStockObject
CloseMetaFile
AbortDoc
EndDoc
gdiPlaySpoolStream
comdlg32
LoadAlterBitmap
user32
GetClassInfoW
GetWindowThreadProcessId
EnumWindowStationsW
OemToCharA
CreateWindowExW
GetWindowContextHelpId
LookupIconIdFromDirectory
DestroyWindow
SetScrollRange
SetMenuInfo
ShowWindow
RegisterClassExA
AppendMenuW
ClientToScreen
TileChildWindows
DefWindowProcA
CreatePopupMenu
RegisterClassA
DrawTextExA
ChangeClipboardChain
MessageBoxA
LoadMenuA
MessageBoxExW
RealChildWindowFromPoint
shell32
DuplicateIcon
SHQueryRecycleBinA
SHGetPathFromIDListA
kernel32
GetVersion
lstrcmp
LCMapStringA
ExitProcess
SetVolumeLabelW
GetModuleFileNameA
TerminateProcess
IsBadWritePtr
GetACP
ReadFile
LocalHandle
FreeEnvironmentStringsW
GetStdHandle
HeapSize
CompareStringA
HeapDestroy
InterlockedIncrement
GetCurrentProcess
GetTickCount
WaitNamedPipeW
LocalFlags
WriteFileEx
LockFile
VirtualQuery
SetEnvironmentVariableA
GetCurrentThread
FindNextFileA
QueryPerformanceCounter
LeaveCriticalSection
EnumCalendarInfoA
VirtualFree
CreateMutexA
OpenMutexA
LoadLibraryA
ExpandEnvironmentStringsA
EnumResourceTypesW
CreateDirectoryExA
SetLastError
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
ExpandEnvironmentStringsW
HeapAlloc
GetProcAddress
FlushFileBuffers
GetSystemTime
CreateProcessW
GetStartupInfoA
HeapLock
RtlUnwind
GlobalGetAtomNameW
TlsGetValue
TlsAlloc
GetFileType
SetFilePointer
GetCurrentThreadId
InterlockedExchange
GetPrivateProfileSectionNamesW
UnmapViewOfFile
GetCurrentDirectoryA
CompareStringW
GetCommandLineA
HeapReAlloc
GetTimeZoneInformation
TlsSetValue
LCMapStringW
VirtualAllocEx
RaiseException
SetVolumeLabelA
OpenProcess
GetModuleHandleA
GetCurrentProcessId
GlobalReAlloc
WriteFile
SetHandleCount
ConnectNamedPipe
GetStringTypeA
EnterCriticalSection
GetVersionExA
HeapFree
GetVolumeInformationW
GetLocalTime
VirtualAlloc
HeapCreate
GetStringTypeW
GetLastError
GetCurrentDirectoryW
TlsFree
FreeEnvironmentStringsA
SetEndOfFile
GetSystemTimeAsFileTime
GetThreadPriority
EnumResourceLanguagesA
CloseHandle
WideCharToMultiByte
InterlockedDecrement
SetStdHandle
FoldStringW
GetOEMCP
UnhandledExceptionFilter
GetEnvironmentStringsW
GetCPInfo
EnumCalendarInfoExA
GetEnvironmentStrings
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ