Static task
static1
Behavioral task
behavioral1
Sample
6471917ff56942b83419ee5de49ed41d61319a43bd6ecf83d152e17775ebc9be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6471917ff56942b83419ee5de49ed41d61319a43bd6ecf83d152e17775ebc9be.exe
Resource
win10v2004-20220812-en
General
-
Target
6471917ff56942b83419ee5de49ed41d61319a43bd6ecf83d152e17775ebc9be
-
Size
108KB
-
MD5
0670636d7da9f0fcf2ceb231b74f1c86
-
SHA1
1002f09fb2bbe1e616d222ea76567eea1d03b3f4
-
SHA256
6471917ff56942b83419ee5de49ed41d61319a43bd6ecf83d152e17775ebc9be
-
SHA512
33c8abf223592d36e9c0951e4b263de356e8d3b7a868f87abdf0873587c4b6372455a2afab2fb2f74d685d808a9d7b404842d54fe799079bfafd6f1d4e75e032
-
SSDEEP
1536:WZ3KLbNyA74z9D/dx7GhT7/RPDXjiHc9xRMbkOTTxYqyqXxf/rzlFND:LLbNy+4z9D/dx74TzNDD9xRMIChfl/
Malware Config
Signatures
Files
-
6471917ff56942b83419ee5de49ed41d61319a43bd6ecf83d152e17775ebc9be.exe windows x86
2dd190112d8b40aa4c3fda3765cb94ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
PostQuitMessage
GetSysColor
SetWindowTextA
UnhookWindowsHookEx
SetWindowPos
GetMessageA
GetSysColorBrush
GetSubMenu
GetScrollPos
EqualRect
FrameRect
EnumWindows
EnableMenuItem
kernel32
VirtualAllocEx
GetTickCount
GetOEMCP
GetFileAttributesA
GetStartupInfoA
InterlockedExchange
GetTempPathA
RtlUnwind
QueryPerformanceCounter
GetThreadLocale
GetSystemTime
GetCurrentProcessId
GetTimeZoneInformation
ExitProcess
SetUnhandledExceptionFilter
FileTimeToSystemTime
gdi32
GetMapMode
DPtoLP
CopyEnhMetaFileA
ExcludeClipRect
FillRgn
CreateICW
SetViewportExtEx
CreateCompatibleBitmap
SelectClipPath
ole32
DoDragDrop
OleRun
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
StgOpenStorage
CoTaskMemRealloc
CoInitialize
CoInitializeSecurity
advapi32
RegCreateKeyA
GetUserNameA
CheckTokenMembership
AdjustTokenPrivileges
RegQueryValueExW
RegCreateKeyExW
FreeSid
GetSecurityDescriptorDacl
QueryServiceStatus
CryptHashData
msvcrt
_mbscmp
puts
_lock
iswspace
_flsbuf
strlen
__getmainargs
_strdup
strcspn
_CIpow
strncpy
__initenv
fprintf
__setusermatherr
signal
fflush
raise
_fdopen
comctl32
InitCommonControls
ImageList_Write
ImageList_LoadImageA
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_LoadImageW
ImageList_GetBkColor
ImageList_SetIconSize
ImageList_DragEnter
ImageList_DrawEx
ImageList_Destroy
shell32
SHGetPathFromIDList
DragQueryFileA
SHBrowseForFolderA
DragAcceptFiles
CommandLineToArgvW
ShellExecuteEx
ShellExecuteW
ExtractIconExW
DragQueryFileW
DoEnvironmentSubstW
ExtractIconW
oleaut32
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayUnaccessData
SafeArrayGetUBound
VariantCopy
SafeArrayPutElement
SafeArrayRedim
SysReAllocStringLen
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE