Static task
static1
Behavioral task
behavioral1
Sample
f6ff61cba06251d95cc501f72f47a47d59d21449cba2626357d4ebb843b2b4d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6ff61cba06251d95cc501f72f47a47d59d21449cba2626357d4ebb843b2b4d5.exe
Resource
win10v2004-20220812-en
General
-
Target
f6ff61cba06251d95cc501f72f47a47d59d21449cba2626357d4ebb843b2b4d5
-
Size
87KB
-
MD5
3d732861cb936a34f9ebc5e15e2bc8fb
-
SHA1
ea21e78773c9453a94f6f8b28a6ba20fe6ae3d8c
-
SHA256
f6ff61cba06251d95cc501f72f47a47d59d21449cba2626357d4ebb843b2b4d5
-
SHA512
28580407ca89f1c063cad2f519197c90a08053b4251ac71ea9289c78bc5895ca3652af5095430670c328e30900bc5a428f247566f5ec4d36cde37c4edde4ccf6
-
SSDEEP
1536:Xft6CxrxvVEWT5CwcHOPIg0N6T4VdACb0fLLpCwCrpocJShjEzg8oIwHst+0:vt6Cxr1Wy5R0NmCzb0fLw2GS5not+0
Malware Config
Signatures
Files
-
f6ff61cba06251d95cc501f72f47a47d59d21449cba2626357d4ebb843b2b4d5.exe windows x86
612b07e6fe86636b3778bd14f7d07413
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
free
fwrite
_iob
_stricmp
_controlfp
strcpy
strchr
memmove
getenv
__getmainargs
__p__environ
fputs
__p__commode
__p__fmode
_XcptFilter
_except_handler3
__set_app_type
calloc
_adjust_fdiv
_exit
__p___initenv
exit
__setusermatherr
_initterm
kernel32
GetStringTypeExA
LCMapStringW
GetFileAttributesA
GetModuleHandleW
FileTimeToDosDateTime
CompareStringW
VirtualProtectEx
SetFileAttributesA
CreateProcessW
GetProcessHeap
GetWindowsDirectoryA
GetProcAddress
GetACP
WaitForMultipleObjects
InterlockedIncrement
InterlockedExchange
RtlUnwind
DuplicateHandle
GetCommandLineW
comctl32
ImageList_Create
ImageList_AddMasked
ImageList_BeginDrag
ImageList_LoadImageW
ImageList_GetImageCount
ImageList_DrawEx
ImageList_GetIconSize
ImageList_SetDragCursorImage
ImageList_GetImageInfo
ole32
StringFromGUID2
RevokeDragDrop
RegisterDragDrop
CreateILockBytesOnHGlobal
CoRevokeClassObject
CoRegisterClassObject
OleFlushClipboard
OleSetClipboard
CoGetClassObject
CoGetInterfaceAndReleaseStream
StgOpenStorageOnILockBytes
OleGetClipboard
gdi32
ExcludeClipRect
SetAbortProc
EnumFontFamiliesExW
SelectPalette
PtVisible
OffsetRgn
GetCurrentPositionEx
GetTextExtentPointA
SetMetaFileBitsEx
EnumFontFamiliesW
CreateSolidBrush
CreatePenIndirect
RectInRegion
CreateDCW
GetTextColor
AbortDoc
GetMetaFileBitsEx
EndPage
user32
GetSystemMenu
GetForegroundWindow
DestroyCursor
MessageBoxA
GetWindowLongA
BeginPaint
GetSysColor
IsWindowVisible
PostMessageA
OemToCharA
GetClientRect
CharNextA
GetCursorPos
advapi32
RegOpenKeyA
CryptGenRandom
GetSecurityDescriptorDacl
SetSecurityDescriptorOwner
RegEnumKeyExW
CryptDestroyHash
GetLengthSid
OpenProcessToken
RegSetValueExW
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RevertToSelf
CryptCreateHash
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ