Static task
static1
Behavioral task
behavioral1
Sample
6f2ab507ce8dec0a631abb9ec10423af1bddcea6c1ce18c568d4d60dd8a32985.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f2ab507ce8dec0a631abb9ec10423af1bddcea6c1ce18c568d4d60dd8a32985.exe
Resource
win10v2004-20220812-en
General
-
Target
6f2ab507ce8dec0a631abb9ec10423af1bddcea6c1ce18c568d4d60dd8a32985
-
Size
265KB
-
MD5
628de4f36ff61ee1e1289150ba901a53
-
SHA1
ac9a31a57bd7052b8c783c44860a4075ef3e81e9
-
SHA256
6f2ab507ce8dec0a631abb9ec10423af1bddcea6c1ce18c568d4d60dd8a32985
-
SHA512
41a05df8c49d7c9054868e7db47be7f5d6f5cd5c0a282d66767a98969e601b0c127dfdecbb0bec7f45fd97643b3eef3db5a71d7e134e5926c810c30d44745b37
-
SSDEEP
3072:5eVPKMQqHulodvQR2XNpNRfQfrCJJDTnRQs4aPhwcfA/ya9U+D9ZF8BeObju:QZnXQrCJ95ZPa/ya6WCdbj
Malware Config
Signatures
Files
-
6f2ab507ce8dec0a631abb9ec10423af1bddcea6c1ce18c568d4d60dd8a32985.exe windows x86
eacf24661341caf95541b2f1f6bea6a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
Sleep
GetComputerNameW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetOverlappedResult
GetFileType
GetFileSize
SetErrorMode
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
RaiseException
GetCurrentThreadId
GetPrivateProfileStringW
GetCommandLineW
GetProcAddress
FreeLibrary
LoadLibraryW
DebugBreak
GetExitCodeProcess
ExpandEnvironmentStringsW
GetLocaleInfoW
VirtualAlloc
VirtualFree
GetPrivateProfileIntW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCurrentDirectoryW
GetEnvironmentVariableW
ResetEvent
CompareStringW
GetModuleHandleW
EnumUILanguagesW
SetEvent
WaitForMultipleObjects
GetFileAttributesW
OpenEventW
CreateEventW
FindResourceW
LockResource
LocalAlloc
DefineDosDeviceW
ReleaseMutex
WaitForSingleObjectEx
MapViewOfFileEx
WritePrivateProfileStringW
GetPrivateProfileSectionW
IsValidLocale
IsValidCodePage
GetSystemDirectoryW
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
LoadResource
FindResourceExW
CreateDirectoryW
GetWindowsDirectoryW
DeleteFileW
DuplicateHandle
CreateThread
SetEndOfFile
SetFileTime
GetVolumeInformationW
WaitForSingleObject
TerminateProcess
ExitProcess
OpenProcess
CreateProcessA
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
GetTickCount
RemoveDirectoryW
GetShortPathNameW
GetFullPathNameW
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
LoadLibraryExW
CreateMutexW
IsDebuggerPresent
OutputDebugStringW
GetSystemDefaultLangID
GetExitCodeThread
MulDiv
GetCurrentThread
VerSetConditionMask
VerifyVersionInfoW
QueryDosDeviceW
OpenThread
lstrlenW
FormatMessageW
LocalFree
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
CopyFileExW
FlushFileBuffers
DeviceIoControl
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointer
WriteFile
ReadFile
GetDriveTypeW
GetLogicalDrives
GetLogicalDriveStringsW
CloseHandle
CreateFileW
MoveFileExW
MoveFileW
CopyFileW
GlobalSize
GlobalFree
GlobalUnlock
GetLastError
GlobalLock
GlobalAlloc
HeapWalk
HeapValidate
HeapCompact
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
HeapCreate
GetProcessHeap
GetCurrentProcess
GlobalMemoryStatus
GetSystemInfo
GetVersionExW
GetVersionExA
SetLastError
SetFileAttributesW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
OutputDebugStringA
SetUnhandledExceptionFilter
GetModuleHandleA
user32
GetWindowLongW
PostMessageW
LoadIconW
MessageBoxW
MessageBoxA
CharNextW
DialogBoxParamW
EndDialog
SetForegroundWindow
MsgWaitForMultipleObjects
PeekMessageW
SetTimer
SetThreadDesktop
DispatchMessageW
RegisterClassExW
SetCursor
DestroyWindow
BeginPaint
EndPaint
PostQuitMessage
GetSysColor
DefWindowProcW
GetWindowTextW
CreateWindowExW
SetFocus
LoadImageW
GetClientRect
MapWindowPoints
InvalidateRect
UpdateWindow
SetWindowPos
GetDC
GetSystemMetrics
ReleaseDC
SetWindowTextW
RemovePropW
GetPropW
SetPropW
FindWindowExW
ShowWindow
PostThreadMessageW
RegisterHotKey
GetMessageW
UnregisterHotKey
LoadStringW
CharPrevW
SendMessageW
msvcrt
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
memcpy
malloc
free
iswctype
?terminate@@YAXXZ
_controlfp
calloc
isdigit
mbtowc
isleadbyte
isxdigit
localeconv
_snprintf
_itoa
wctomb
ferror
wcstombs
realloc
__badioinfo
__pioinfo
_read
_fileno
wcsrchr
_wcsnicmp
_wtoi
_wcsicmp
towupper
??3@YAXPAX@Z
??2@YAPAXI@Z
wcsstr
wcsncmp
bsearch
ungetc
_isatty
_write
_lseeki64
__wgetmainargs
_iob
__mb_cur_max
_vsnprintf
wcschr
_vsnwprintf
_wcslwr
_errno
__CxxFrameHandler
memset
ntdll
RtlAllocateHeap
RtlFreeHeap
RtlInitUnicodeString
NtOpenDirectoryObject
NtQueryDirectoryObject
NtClose
NtSetInformationFile
NtQuerySystemInformation
NtQueryObject
NtOpenFile
RtlUnwind
RtlNtStatusToDosError
RtlCompareMemory
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtOpenKey
NtQueryValueKey
NtWaitForSingleObject
NtDeviceIoControlFile
NtResetEvent
NtCreateEvent
advapi32
RegisterTraceGuidsW
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
SetThreadToken
DuplicateTokenEx
OpenThreadToken
gdi32
TranslateCharsetInfo
DeleteDC
SelectObject
DeleteObject
CreateFontIndirectW
GetDeviceCaps
GetTextExtentPoint32W
SetBkMode
SetBkColor
SetTextColor
SetBrushOrgEx
SetStretchBltMode
CreateCompatibleBitmap
GetObjectW
CreateCompatibleDC
GetStockObject
CreateSolidBrush
BitBlt
AddFontResourceExW
EnumFontFamiliesExW
CreateDCW
StretchBlt
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rrnooyd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE