Static task
static1
Behavioral task
behavioral1
Sample
611e35522bc6c03b00e20224e261ad5daae281e2856581d9ac68cc7f2973558c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
611e35522bc6c03b00e20224e261ad5daae281e2856581d9ac68cc7f2973558c.exe
Resource
win10v2004-20220812-en
General
-
Target
611e35522bc6c03b00e20224e261ad5daae281e2856581d9ac68cc7f2973558c
-
Size
314KB
-
MD5
61b4391bf3f2e7373627a01658b8407a
-
SHA1
4ebb41232137cbc13383942fc6d780eec8caf0ad
-
SHA256
611e35522bc6c03b00e20224e261ad5daae281e2856581d9ac68cc7f2973558c
-
SHA512
6c4bbf08be16d68ad0ab8932527ba7d9b595d6846d23663380b68da6314a8634269b998f0a6101c2af1ca2bdd1b4c1a81260b76bf8ed77160ff7c831295e1324
-
SSDEEP
6144:kP8bM/WODbYQViye3PfcKrKyw+QxgKVreJN:k0o+OXFWdGyFQxTCN
Malware Config
Signatures
Files
-
611e35522bc6c03b00e20224e261ad5daae281e2856581d9ac68cc7f2973558c.exe windows x86
f324dc3baaf669694ba68468b4637d67
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
CreateProcessW
LocalFree
MoveFileExW
CreateFileW
MultiByteToWideChar
WaitForSingleObject
GetLastError
GetPrivateProfileStringW
FindClose
GetModuleHandleW
GetModuleFileNameW
CompareStringA
FormatMessageW
SetFilePointer
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
InitializeCriticalSection
LoadLibraryA
CloseHandle
FlushFileBuffers
CopyFileW
Sleep
FindFirstFileW
OpenProcess
GetLocaleInfoA
GetTempFileNameW
IsValidCodePage
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
CreateDirectoryW
RemoveDirectoryW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
DeleteFileW
MoveFileW
ExitThread
GetCurrentThreadId
CreateThread
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetFileAttributesW
SetFileAttributesW
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesA
HeapReAlloc
GetDriveTypeA
CreateFileA
GetProcAddress
GetModuleHandleA
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetFullPathNameW
GetCurrentDirectoryA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
HeapSize
RaiseException
VirtualAlloc
SetStdHandle
ReadFile
GetCPInfo
GetACP
GetOEMCP
CompareStringW
user32
SetTimer
GetClientRect
GetDC
LoadIconW
OffsetRect
ReleaseDC
GetDlgItem
EndDialog
CopyRect
SetWindowPos
GetDesktopWindow
ScreenToClient
GetWindowRect
DrawTextW
SendMessageW
SetWindowTextW
DialogBoxParamW
GetParent
gdi32
SelectObject
wsock32
ntohl
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE