Static task
static1
Behavioral task
behavioral1
Sample
d6864c5fcdc73587239b36fbbd606e7dba973cfc2924c2a9e4aeafbffb1d949d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6864c5fcdc73587239b36fbbd606e7dba973cfc2924c2a9e4aeafbffb1d949d.exe
Resource
win10v2004-20220812-en
General
-
Target
d6864c5fcdc73587239b36fbbd606e7dba973cfc2924c2a9e4aeafbffb1d949d
-
Size
312KB
-
MD5
48cc00c8de6eb921ec683e48fb1b6620
-
SHA1
7f111ee28e61a8800529d6bd28e082b0885a8c0b
-
SHA256
d6864c5fcdc73587239b36fbbd606e7dba973cfc2924c2a9e4aeafbffb1d949d
-
SHA512
bb8b55bc6b2d3b26e38553b6761dcdbe924e7805e156df8d81e16d60ad3c9a7cdaa3e0a3c48497e429c162fe1d0cc6f687c10d94c7bf43872c27796ac8fced67
-
SSDEEP
3072:GeAGcNNwmlR2GNUbomMYMLnXtoKOmiNL2SJOUOhopk31CSd7h5ePz5Sl1Qscd6Np:8vNNtWuYcGHmiNLOckkOg7kk6Nln
Malware Config
Signatures
Files
-
d6864c5fcdc73587239b36fbbd606e7dba973cfc2924c2a9e4aeafbffb1d949d.exe windows x86
8e3435044b7cfc8830f0d8f8b832eb70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
FindFirstFileA
GetFullPathNameA
FindClose
GetDriveTypeA
GetLocaleInfoA
GetConsoleScreenBufferInfo
SetVolumeLabelA
GetStdHandle
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
ReadFile
SetConsoleMode
GetConsoleMode
lstrcpynA
lstrcmpiA
GetFileAttributesA
LeaveCriticalSection
lstrlenA
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
InterlockedExchange
CreateMutexA
HeapFree
HeapAlloc
GetProcessHeap
GetCurrentProcess
SetConsoleCtrlHandler
MultiByteToWideChar
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
SetStdHandle
GetFileType
EnterCriticalSection
SystemTimeToFileTime
GetCPInfo
GetACP
GetOEMCP
GetVersion
UnhandledExceptionFilter
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
WideCharToMultiByte
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
FlushFileBuffers
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
LoadLibraryA
GetLocaleInfoW
GetVolumeInformationA
GetLocalTime
CreateFileA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetLastError
SetFileAttributesA
SetEndOfFile
CloseHandle
SetFilePointer
HeapReAlloc
GetCommandLineA
WriteFile
GetCurrentDirectoryA
SetEnvironmentVariableW
DeleteFileA
CreateDirectoryA
advapi32
OpenProcessToken
LookupPrivilegeValueA
GetSecurityDescriptorControl
GetKernelObjectSecurity
AdjustTokenPrivileges
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
IsValidAcl
GetSecurityDescriptorGroup
IsValidSid
user32
CharToOemA
OemToCharA
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE