Static task
static1
Behavioral task
behavioral1
Sample
a6c1283e19c6c7d40be1521e0065ee134065194b2d3b6a27e4a37cd6be7bd1bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6c1283e19c6c7d40be1521e0065ee134065194b2d3b6a27e4a37cd6be7bd1bf.exe
Resource
win10v2004-20220812-en
General
-
Target
a6c1283e19c6c7d40be1521e0065ee134065194b2d3b6a27e4a37cd6be7bd1bf
-
Size
92KB
-
MD5
0838bfcd70bb888e28c71ce765e24bf6
-
SHA1
745d3342ae364548a1b3d429f29178a86f3fb8bb
-
SHA256
a6c1283e19c6c7d40be1521e0065ee134065194b2d3b6a27e4a37cd6be7bd1bf
-
SHA512
bdfa9831c88d5c6e649c48ecf83ab683097685a3a3137d2ae07ef9124254759f28152a29ae08f7d28ad78a542fd8352d4141a8f4966f40be3ec1af0787128c8e
-
SSDEEP
1536:dPjO4KfpfccQDsA9jg1keqRvY5BtEzhR4tADgB0e2ksfe9kf5t71T:dPq/xfLQwDdtEzKkgBlgx55t
Malware Config
Signatures
Files
-
a6c1283e19c6c7d40be1521e0065ee134065194b2d3b6a27e4a37cd6be7bd1bf.exe windows x86
fbded792fb406532f449d2953fd289b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
kernel32
GetLastError
MultiByteToWideChar
DeleteFileA
GetTempFileNameA
GetTempPathA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
GetCurrentProcess
GetVersionExA
LockResource
LoadResource
FindResourceExA
FreeLibrary
LoadLibraryExA
CopyFileA
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
Sleep
VirtualAlloc
HeapReAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CloseHandle
FlushFileBuffers
user32
MessageBoxA
ExitWindowsEx
msi
ord77
ord151
ord152
ord148
ord170
ord124
ord17
ord44
ord8
ord67
shell32
ShellExecuteExA
ole32
StgOpenStorage
StgCreateDocfile
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE